Critical cPanel Vulnerability Under Active Exploitation Before Patch Release, CISA Confirms
A critical vulnerability in cPanel, one of the internet's most widely deployed web hosting control panels, is now confirmed under active exploitation with at least one victim reporting a ransomware demand. Security researchers and federal authorities have raised alarm over the timing of the attacks, which began before official patches were made available to administrators. The Cybersecurity and Infrastructure Security Agency (CISA) added the flaw to its Known Exploited Vulnerabilities catalog, formally acknowledging that threat actors are actively leveraging the weakness to compromise servers at scale.
The vulnerability affects a core component of cPanel and WHM, the software suite trusted by countless hosting providers to manage websites, email, and server configurations. The exposure window is significant: exploitation commenced while patches were still in development, leaving administrators with no opportunity to apply fixes preemptively. Sources indicate that millions of websites relying on cPanel-managed infrastructure could potentially be at risk, though the precise number of successfully compromised systems remains unclear. The gap between disclosure and patch availability created conditions that skilled attackers were quick to exploit, a pattern that continues to plague enterprise and shared hosting environments alike.
The incident underscores persistent tensions in the vulnerability response ecosystem, particularly when widely adopted server software becomes an attractive target. Hosting providers and administrators face immediate pressure to assess exposure, apply available patches, and monitor for indicators of compromise. The inclusion in CISA's KEV list carries regulatory weight, potentially compelling federal contractors and critical infrastructure operators to demonstrate remediation efforts. Security teams are advised to treat this as a high-priority remediation event given confirmed in-the-wild exploitation and credible reports of ransomware deployment linked to the flaw.