Overview of the Vulnerability
This vulnerability in cPanel & WHM is an authentication bypass flaw that can allow an attacker to gain full administrative access without requiring a valid username or password.
Under normal conditions, cPanel authentication follows a secure login flow. However, this vulnerability disrupts that process by allowing manipulated session data to be trusted by the system.
How cPanel Login Normally Works
When a user logs into cPanel/WHM, the following process takes place:
- User accesses the WHM/cPanel login page
- Username and password are entered
- cPanel verifies the credentials
- A session file (temporary login ticket) is created
- The session is stored on the server
- All subsequent requests use this session for authentication
This ensures that only authenticated users can access administrative features.
What Goes Wrong in This Vulnerability
Due to the bug, an attacker is able to manipulate the session file during the login process.
Instead of waiting for proper authentication, cPanel may incorrectly trust session data that has been altered before verification is completed.
How the Attack Works
An attacker can send a specially crafted request containing modified or fake session parameters.
By inspecting login requests using browser developer tools (Network tab), the attacker can alter outgoing requests before they reach the server.
Example Scenario
Normal Request:
user=admin
pass=wrongpassword Modified Malicious Request:
user=admin
pass=wrongpassword
cp_security_token=/cpsess99999999
successful_external_auth_with_timestamp=1 Note: This is only a conceptual example for understanding the issue.
What the Attacker Achieves
- No need to know the actual password
- Injects fake authentication-related parameters
- Sends a modified request to the server
cPanel then incorrectly processes these values and may treat the session as authenticated.
Root Cause of the Issue
The vulnerability occurs because:
- The attacker injects a fake token into the login request
- cPanel writes this data into the session file too early
- The session file is then used for validation
- cPanel mistakenly trusts the manipulated session data
In Simple Terms:
cPanel trusted session data that was influenced by attacker-controlled input before authentication was completed.
Fixed Versions Released by cPanel
The issue has been patched in the following versions:
11.86.0.41
11.110.0.97
11.118.0.63
11.126.0.54
11.130.0.19
11.132.0.29
11.136.0.5
11.134.0.20 If your system is running any of these versions, the vulnerability is considered fixed. Older versions may still be at risk.
Required Actions (Update Process)
To secure your server, update cPanel using:
/scripts/upcp --force Verify Update Status
/usr/local/cpanel/cpanel -V Restart cPanel Service
/scripts/restartsrv_cpsrvd Temporary Mitigation (If Update Is Not Possible)
If immediate updating is not possible, you can reduce exposure by blocking access to cPanel services:
2083 → cPanel
2087 → WHM
2095 → Webmail
2096 → Webmail SSL Important Drawback:
Blocking these ports will also prevent legitimate users and administrators from accessing cPanel/WHM until access is restored.
Detection of Potential Exploitation
cPanel also provides a detection script to identify signs of compromise. It checks for the following red flags:
1. Fake Token + Failed Token Combination
token_denied=1
cp_security_token=/cpsessXXX
origin=method=badpass 2. Pre-Authentication Session Claiming Login Success
3. 2FA Marked as Passed Without Valid Login
4. Password Field Containing Hidden Newlines
Detection Script Reference: cPanel Security Advisory
Additional Security Recommendations
To further reduce risk and strengthen security posture:
- Enable IP-based access restrictions for WHM/cPanel
- Restrict access using VPN-only administration
- Monitor logs for unusual or repeated login attempts
- Enforce strong password policies
- Enable Multi-Factor Authentication (MFA) for all admin users
Conclusion
This vulnerability highlights how session handling flaws can lead to serious authentication bypass issues in critical systems like cPanel & WHM. While patches are available, securing access through layered controls such as IP restriction, MFA, and monitoring is essential to reduce exposure and prevent exploitation.
Worried about cPanel/WHM security vulnerabilities or need help securing your server infrastructure?
Get expert assistance from SupportPro for proactive monitoring, patch management, and 24/7 technical support to keep your systems safe and fully protected.

