{"id":14589,"date":"2026-05-09T08:33:46","date_gmt":"2026-05-09T08:33:46","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=14589"},"modified":"2026-05-09T08:33:46","modified_gmt":"2026-05-09T08:33:46","slug":"pentest-instruments-com-releases-free-scanner-for-cve-2026-41940-as-cpanel-authentication-bypass-enters-its-third-week-of-lively-exploitation","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=14589","title":{"rendered":"Pentest-Instruments.com Releases Free Scanner for CVE-2026-41940 as cPanel Authentication Bypass Enters Its Third Week of Lively Exploitation"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/pentest-tools.com\/pr\">Pentest-Instruments.com<\/a> has launched a free, no-login scanner for <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-41940\">CVE-2026-41940<\/a>, the vital authentication bypass affecting cPanel &amp; WHM and WP Squared that has been actively exploited within the wild since a minimum of February 2026.<\/p>\n<div class=\"jeg_ad jeg_ad_article jnews_content_inline_ads  \">\n<div class=\"ads-wrapper align-right \"><a rel=\"nofollow\" target=\"_blank\" href=\"http:\/\/bit.ly\/jnewsio\" aria-label=\"Visit advertisement link\" target=\"_blank\" rel=\"nofollow noopener\" class=\"adlink ads_image align-right\"><br \/>\n                                    <img decoding=\"async\" class=\"lazyload\" src=\"https:\/\/itsecguru.dessol.com\/wp-content\/uploads\/2018\/08\/ad_300x250.jpg\" alt=\"\" data-pin-no-hover=\"true\"\/><br \/>\n                                <\/a><\/div>\n<\/div>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The vulnerability, rated CVSS 9.8 Important and added to <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2026\/04\/30\/cisa-adds-one-known-exploited-vulnerability-catalog\">CISA\u2019s Recognized Exploited Vulnerabilities catalog<\/a>, permits an unauthenticated attacker to bypass cPanel\u2019s login course of fully by exploiting a CRLF injection flaw in cpsrvd, the cPanel service daemon. By manipulating the whostmgrsession cookie, an attacker can inject authentication state flags right into a session file earlier than it&#8217;s validated, granting full entry with out credentials, consumer interplay, or particular privileges.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The size of publicity is important. Roughly 1.5 million cPanel and WHM interfaces are immediately reachable from the web, in accordance with Shodan knowledge from April 2026. As a result of a single cPanel server usually hosts dozens to a whole bunch of separate buyer accounts, a profitable exploit impacts each account on that server, not simply the first account holder. Each the cPanel consumer interface (ports 2082\/2083) and the WHM administrator interface (ports 2086\/2087) are impacted, together with XML-API and UAPI endpoints that depend on session authentication.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">What makes this vulnerability significantly notable is how lengthy it went undetected. KnownHost CEO Daniel Pearson has <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.reddit.com\/r\/cpanel\/comments\/1syyajp\/comment\/oiyg0fr\/\">confirmed<\/a> that his firm noticed exploitation makes an attempt as early as February 23, 2026, 64 days earlier than any public advisory, patch, or CVE existed. Lively ransomware and botnet campaigns have since been documented throughout compromised cPanel infrastructure.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">A patch was launched by cPanel &amp; WHM on April 28, 2026, and Cloudflare deployed an emergency WAF rule on April 30 as a partial network-edge mitigation for infrastructure behind Cloudflare. WP Squared has additionally launched an advisory. watchTowr Labs <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/labs.watchtowr.com\/the-internet-is-falling-down-falling-down-falling-down-cpanel-whm-authentication-bypass-cve-2026-41940\/\">revealed<\/a> an in depth technical evaluation and proof-of-concept.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The Pentest-Instruments.com scanner goes past model banner checking: it sends a crafted CRLF payload to the cPanel login endpoint and assesses exploitability primarily based on the server\u2019s precise response. The staff notes that model checks alone usually are not enough to verify whether or not a given occasion is genuinely in danger.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">\u201cPatch first,\u201d stated the Pentest-Instruments.com safety staff. \u201cExamine the model desk and replace to the primary patched construct in your department. If you happen to\u2019re behind Cloudflare, confirm the Managed Ruleset is enabled. Then lock down ports 2082, 2083, 2086, and 2087 to trusted IP ranges and watch your entry logs for classes that authenticate suspiciously quick. Model checks alone received\u2019t let you know should you\u2019re truly exploitable.\u201d<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">For organisations that can&#8217;t patch instantly, the advisable interim steps are to limit cPanel and WHM port entry to trusted IP ranges, confirm Cloudflare Managed Ruleset protection if relevant, and monitor entry logs for classes with unusually quick time-to-authenticate.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The free scanner is dwell at: <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/pentest-tools.com\/network-vulnerability-scanning\/cve-2026-41940-scanner-cpanel-authentication-bypass\">pentest-tools.com\/network-vulnerability-scanning\/cve-2026-41940-scanner-cpanel-authentication-bypass<\/a><\/p>\n<\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Pentest-Instruments.com has launched a free, no-login scanner for CVE-2026-41940, the vital authentication bypass affecting cPanel &amp; WHM and WP Squared that has been actively exploited within the wild since a minimum of February 2026. The vulnerability, rated CVSS 9.8 Important and added to CISA\u2019s Recognized Exploited Vulnerabilities catalog, permits an unauthenticated attacker to bypass cPanel\u2019s [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":14591,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[768,3369,210,9012,9011,584,2036,160,9010,99,6738,496],"class_list":["post-14589","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-active","tag-authentication","tag-bypass","tag-cpanel","tag-cve202641940","tag-enters","tag-exploitation","tag-free","tag-pentesttools-com","tag-releases","tag-scanner","tag-week"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14589","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14589"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14589\/revisions"}],"predecessor-version":[{"id":14590,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14589\/revisions\/14590"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/14591"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14589"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14589"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-09 10:31:09 UTC -->