Cybersecurity

Critical cPanel Security Flaw Affects All Supported Versions — Patch Immediately

A critical authentication vulnerability in cPanel affects every currently supported version, potentially giving attackers unauthorized access to your web hosting control panel. Here's what you need to know and how to fix it fast.

If your website runs on a shared or managed hosting account — or if you manage your own web server — there's a critical security issue you need to act on right now. cPanel, the world's most widely used web hosting control panel, has just patched a serious authentication vulnerability that affects every currently supported version of its software.

This isn't a theoretical risk. The flaw is serious enough that major hosting providers are already scrambling to apply emergency mitigations. Here's everything you need to know.

What Is cPanel, and Why Should You Care?

cPanel is a graphical web hosting control panel that lets website owners and server administrators manage websites, email accounts, databases, and files without needing to know complex command-line tools. If you've ever logged into a hosting account and seen a dashboard where you can set up email addresses, manage domains, or install WordPress — there's a good chance you were looking at cPanel.

For Yuba City small businesses that host their own websites or use services that run cPanel on the backend, this vulnerability is directly relevant to you.

What's the Vulnerability?

According to The Hacker News, cPanel released security updates on April 29, 2026 to address a flaw impacting various authentication paths — meaning the parts of the software that verify who is and isn't allowed to log in. If exploited, an attacker could bypass that authentication process entirely and gain unauthorized access to the control panel.

As Security Affairs reports, the flaw affects all supported versions — not just an older, neglected build, but every version that cPanel currently maintains and supports. That's an unusually broad scope for a single vulnerability.

While cPanel itself has not publicly disclosed the technical details of the flaw (a common practice to prevent bad actors from reverse-engineering an exploit), web hosting company Namecheap described it as "an authentication login exploit that could allow unauthorized access to the control panel."

In plain terms: someone who shouldn't have access to your website's backend could potentially walk right in.

How Serious Is This?

Pretty serious. The fact that it touches all supported versions means there's no "safe" version to fall back on — every cPanel installation needs to be updated. That's a strong signal that this is being treated as a critical-severity issue across the industry.

Namecheap, one of the largest domain registration and hosting companies in the world, didn't wait for a formal patch. According to The Hacker News, Namecheap immediately applied a temporary firewall rule blocking access to TCP ports 2083 and 2087 — the standard ports cPanel and WHM (Web Host Manager) use — as a precautionary measure.

The tradeoff? That temporary block also restricted customer access to cPanel and WHM interfaces, and as Security Affairs notes, it could also disrupt Webmail, Webdisk, and both SSL and non-SSL connections. When a major hosting company is willing to temporarily cut off its own customers' access to prevent exploitation, you know the underlying risk is real.

As of April 29, 2026 at 02:42 a.m. UTC, Namecheap confirmed the fix had been deployed across its Reseller, Stellar Business, and remaining servers.

Are You Affected?

Here's a quick way to figure out your exposure:

You're likely affected if you:

  • Self-host a website on a VPS (Virtual Private Server) or dedicated server running cPanel
  • Manage web hosting for clients through WHM (Web Host Manager)
  • Run a reseller hosting account that includes cPanel access
  • Work with a web developer or IT provider who uses cPanel to manage your site's server

You're probably not directly affected if you:

  • Use a fully managed hosting platform that doesn't rely on cPanel (like WordPress.com, Squarespace, or Wix)
  • Use a cloud platform like AWS, Google Cloud, or Azure without cPanel installed

If you're not sure which category you fall into, check with your hosting provider or the person who manages your website. Ask them directly: "Are we running cPanel, and have you applied the April 29, 2026 security patch?"

Step-by-Step: How to Patch Your cPanel Server

If you manage your own server, here's what to do:

Step 1: Check your current cPanel version. Log into WHM and navigate to Server Information or run /usr/local/cpanel/cpanel -V from the command line.

Step 2: Compare against the patched versions. The following versions contain the fix, per The Hacker News:

  • 11.110.0.97
  • 11.118.0.63
  • 11.126.0.54
  • 11.132.0.29
  • 11.136.0.5
  • 11.134.0.20

If your version number is lower than the patched release in your branch, you need to update immediately.

Step 3: Run the cPanel update. From WHM, go to cPanel > Upgrade to Latest Version, or run the following from your server's command line:

/scripts/upcp

Step 4: Verify the update applied successfully. Check your version number again after the update completes and confirm it matches one of the patched versions above.

Step 5: If you're on an unsupported version, act now. cPanel itself issued a pointed warning: "If your server is not running a supported version of cPanel that is eligible for this update, it is highly recommended that you work toward updating your server as soon as possible, as it may also be affected." Older, unsupported versions won't receive this patch — which means upgrading to a supported branch isn't optional at this point, it's urgent.

Step 6: Check with your managed hosting provider. If someone else manages your server, reach out today and confirm they've applied the patch. Don't assume it's been handled automatically.

What If You're Not Sure Where to Start?

Vulnerabilities like this are a reminder that web hosting security isn't just a "set it and forget it" situation. Keeping server software patched and monitoring for unusual access attempts takes real attention — especially for small businesses that don't have a dedicated IT person on staff.

If you're a local business owner who manages a website and you're not sure whether your hosting setup is exposed, we're happy to help you sort it out. Our /business IT support services include helping clients understand and secure their web infrastructure.

The Bottom Line

A critical authentication flaw in cPanel is patched and available — but only if you (or your hosting provider) actually apply the update. The vulnerability affects every supported version, and the industry response has been immediate. If you run cPanel, check your version today and update if you haven't already. The fix is available. There's no reason to stay exposed.

Need help with your computer?
We provide professional computer repair and IT support in Yuba City.
Tags
Cybersecurity Vulnerability Patch Management Web Security Small Business IT