GBHackers

cPanelSniper PoC Exploit Disclosed as 44,000 Servers Reportedly Compromised


A critical zero-day vulnerability in cPanel and WebHost Manager (WHM) is under massive active exploitation following the public release of a sophisticated proof-of-concept exploit.

Tracked as CVE-2026-41940, this flaw has already compromised tens of thousands of servers worldwide.

The vulnerability, identified as CVE-2026-41940, is a severe authentication bypass flaw affecting cPanel and WHM.

It carries a near-maximum severity score and allows remote, unauthenticated attackers to gain complete root administrative access to vulnerable servers. The core issue stems from how cPanel handles login sessions and stores them on disk.

Attackers can inject Carriage Return Line Feed (CRLF) sequences into the HTTP Authorization header to perform a CRLF injection. When the system saves this data, the injected fields trick cPanel into treating the fake session as a fully authenticated root user.

This completely bypasses both standard passwords and two-factor authentication mechanisms without triggering traditional security alerts.

The cPanelSniper Framework

The threat landscape worsened dramatically with the publication of “cPanelSniper,” an open-source exploit framework hosted on GitHub.

Created by a security researcher ynsmroztas, operating under the handle Mitsec, this pure Python tool automates the complex four-stage exploit chain required to compromise a server.

The framework allows operators to seamlessly generate pre-authentication sessions, inject the malicious CRLF payload, and flush the system cache to activate the rogue administrative session. Once the bypass is complete, the tool drops the user into an interactive shell.

This grants immediate abilities to execute operating system commands, change root passwords, list hosted accounts, and create backdoor administrative profiles with minimal technical effort.

The easy availability of this automated exploit tool has triggered widespread, opportunistic attacks across the internet.

The Shadowserver Foundation, a prominent non-profit security organization, reported intense exploitation activity targeting exposed cPanel instances globally.

Their security honeypots detected at least 44,000 unique IP addresses that appear to be successfully compromised.

Alarmingly, these infected servers are currently being weaponized as a botnet to scan the internet and launch further attacks against other vulnerable systems. With over 1.5 million cPanel instances exposed globally, the pool of potential targets remains dangerously massive.

Mitigation Strategies

Server operators must immediately take emergency action to prevent a complete host takeover.

Administrators must immediately update their cPanel, WHM, and WP Squared installations to the latest patched versions, as the vulnerability affects all major supported release branches.

For threat hunting and detection, defenders should thoroughly inspect their server’s session directories for indicators of compromise.

Specifically, security teams should actively look for suspicious artifacts within pre-authentication sessions, unexpected token states, or malformed multi-line password entries that indicate a successful CRLF injection attack.

Servers relying on disabled automatic updates must be manually remediated as an absolute priority.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link