
A critical security vulnerability has been identified in cPanel affecting the authentication login system used by cPanel & WHM. This issue impacts all currently supported versions of cPanel and has been classified as a high-severity security concern due to its potential impact on server access controls.
The issue relates specifically to an authentication login exploit, which could affect how users access the cPanel and WHM interfaces. Because these platforms are widely used to manage hosting environments, websites, and server configurations, the vulnerability has prompted an immediate response from cPanel.
Official Patch Updates Released
cPanel has now released patched updates across multiple release tiers to address the issue. These updates contain fixes that strengthen the authentication system and resolve the vulnerability across supported versions.
The following cPanel & WHM release tiers have received updates:
- 11.110 has been updated from 11.110.0.96 to 11.110.0.97
- 11.118 has been updated from 11.118.0.61 to 11.118.0.63
- 11.126 has been updated from 11.126.0.53 to 11.126.0.54
- 11.132 has been updated from 11.132.0.27 to 11.132.0.29
- 11.134 has been updated from 11.134.0.19 to 11.134.0.20
- 11.136 has been updated from 11.136.0.4 to 11.136.0.5
These updates are being distributed through standard cPanel update channels and should be applied as soon as they become available on affected servers.
Why This Update Is Important
The vulnerability affects the login authentication layer, which is one of the most critical components of cPanel & WHM. Any weakness in this area can potentially expose administrative access points or increase the risk of unauthorized login attempts.
Since cPanel is widely deployed across hosting providers and server environments, timely patching is essential to maintaining server security and protecting hosted websites and services.
Temporary Security Measures
Before applying the patch, cPanel recommends implementing temporary security controls where necessary to reduce exposure risk. These include restricting access to control panel services at the network level and limiting login access to trusted sources only.
In some cases, administrators may also temporarily disable certain control panel-related services or restrict access to cPanel, WHM, and webmail interfaces until the system has been updated.
Additionally, disabling service or proxy subdomains is recommended as an extra protective measure to prevent direct exposure of control panel endpoints.
Unsupported Versions Warning
Servers running unsupported versions of cPanel are also likely to be affected but will not receive official security patches. In these cases, upgrading to a supported version is strongly recommended to ensure the latest security fixes can be applied.
Final Summary
This vulnerability highlights the importance of keeping server software up to date, especially systems like cPanel & WHM that handle sensitive administrative access.
The release of patched versions across multiple tiers ensures that supported systems can be secured quickly. Administrators are strongly encouraged to update their servers as soon as possible and apply temporary security measures where immediate patching is not feasible.
For full details, refer to the official advisory:
https://support.cpanel.net/hc/en-us/articles/40073787579671-Critical-Vulnerability-with-cPanel-WHM-Login-Authentication




