Potential Impact
- Complete takeover of the WHM administrative interface with root privileges
- Access to all hosted cPanel accounts on the affected server
- Theft, modification, or deletion of hosted websites, email and databases
- Deployment of webshells, malware or ransomware
- Lateral movement to other systems on the same network
- Data exfiltration including credentials, PII and business critical information
Given that cPanel is estimated to power over 70 million domains globally, the potential scope of impact is exceptionally broad.
Affected Systems and Remediation
The following are affected by CVE-2026-41940:
- All currently supported versions of cPanel & WHM after 11.40 (cPanel security advisory)
- Servers with WHM port 2087 or cPanel port 2083 exposed are at the highest risk
Affected users are strongly advised to review the relevant cPanel security advisory and apply the vendor supplied patches as soon as possible to mitigate risk.
TrendAI Protection and Detection Against Exploitation
In addition to the vendor supplied patches and remediation, TrendAI has released several critical information pieces and protections against exploitation.
TrendAI Vision One
Threat Intelligence Hub
TrendAI has added information into the Vision One Threat Intelligence Hub that provides relevant background information including Tactics, Techniques and Procedures (TTPs), Risk Management Guidance, and Threat Hunting Queries.
Cyber Risk Overview
A Time-Critical Vulnerability entry for this threat has been added in the Vision One Cyber Risk Overview section.
Detection Rules and Filters
TrendAI XDR for Cloud (for exploitation activities)
- AWS Security Logging and Monitoring Evidence Removal
TrendAI XDR for Endpoints
- cPanel Session File Creation in Raw Session Directory
- Suspicious cPanel Session File Creation by External Process
TrendAI Vision One Endpoint Security IPS Rules (including Server and Workload Security (SWP) and Deep Security)
- Rule 1012556
TrendAI Vision One Network Security Digital Vaccine (DV) Filters (including TippingPoint)
- DV Filter 47364
TrendAI Deep Discovery Inspector (DDI)
- Rule 5792 (NCIE/NCCP)
