GBHackers

LiteSpeed cPanel Plugin 0-Day Exploited for Server Root Access


A critical zero-day privilege escalation vulnerability in the LiteSpeed User-End cPanel plugin is being actively exploited in the wild, enabling any authenticated cPanel user to execute arbitrary scripts as root and gain full server control.

Tracked as CVE-2026-48172 with a maximum CVSS score of 10.0, the flaw has been patched as of May 21, 2026.

The root cause is a logic flaw in the plugin’s lsws.redisAble JSON-API endpoint, which is exposed to every logged-in cPanel user by default.

LiteSpeed cPanel Plugin 0-Day Exploited

There is no race condition to win, nor an authentication gap to bridge; a single malformed API call with the right parameter values is sufficient for the attacker to escalate to root. The bug is particularly dangerous on shared-hosting environments where every tenant already holds a valid cPanel session.

Notably, the initial advisory stated that LiteSpeed’s WHM plugin was not affected. Still, a follow-up on May 21 revised that position; a full security review uncovered additional potential vulnerabilities in both plugins, though these have not been reported as exploited.

Any cPanel account, including a low-privileged user or an attacker with a compromised tenant account, can exploit the flaw to gain root-level access, enabling complete system compromise, data exfiltration, backdoor installation, and lateral movement.

The attack surface is broad: cPanel powers millions of shared-hosting servers globally, and the LiteSpeed User-End plugin has been widely deployed across hosting fleets due to its caching features.

The attack leaves a detectable footprint in cPanel’s access logs. According to Litespeed advisory, server administrators should immediately run the following IOC detection command:

grep -rE "cpanel_jsonapi_func=redisAble" /var/cpanel/logs /usr/local/cpanel/logs/ 2>/dev/null

Any output indicates a potential attempt at exploitation. If output is found, treat the host as compromised, rotate all credentials, including root passwords and SSH keys, and audit cron jobs and authorized_keys for unauthorized additions.

cPanel’s decision to force a fleet-wide uninstall five hours before its scheduled TSR window underscores the severity of real-time exploitation.

The LiteSpeed advisory is part of a broader May 2026 vulnerability streak that spans 22 days and includes eight advisory events across the cPanel ecosystem, including the critical pre-auth bypass CVE-2026-41940 (CVSS 9.8).

Mitigation

Administrators should immediately upgrade to the LiteSpeed WHM Plugin v5.3.1.0, which is bundled with the cPanel Plugin v2.4.7. To force a full cPanel update, run:

/scripts/upcp --force

To immediately remove the vulnerable plugin without upgrading, use:

/usr/local/lsws/admin/misc/lscmctl cpanelplugin --uninstall

LiteSpeed also completed a broader security review in coordination with the cPanel/WebPros team, proactively patching additional potential attack vectors, none of which have been reported as exploited.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link