May 2026 has been the worst calendar month for hosting panel security in recent memory. Within a 30-day window, the industry's four major commercial control panel vendors and its dominant billing platform each reported vulnerabilities ranging from CVSS 9.8 authentication bypasses to arbitrary code execution to cross-customer data exposure. Active exploitation was underway on multiple fronts simultaneously. Government agencies in five countries issued alerts. Ransomware operators had automated delivery pipelines running before most hosters had finished reading the first advisory.
This post assembles the verified facts across every affected platform into a single reference: what happened, what the CVE numbers mean, which versions are vulnerable, and what different audiences need to do right now. It also examines the structural question that the month's events make harder to ignore: why a decade of price increases across the legacy panel market has not produced commensurate architectural modernization.
The May 2026 Security Timeline
The following chronology is constructed from public vendor advisories, CISA KEV catalog entries, NVD records, and reporting by organizations including WatchTowr Labs, Shadowserver, Censys, Help Net Security, and InMotion Hosting's pre-patch advisory program.
- February 23, 2026 -- First exploitation of CVE-2026-41940 (cPanel) observed in the wild. Patch not yet released. A 65-day zero-day window begins.
- April 28, 2026 -- WebPros publishes CVE-2026-41940 advisory and emergency patch. CVSS 9.8. 44,000+ IPs begin scanning within 48 hours.
- April 29, 2026 -- WatchTowr Labs publishes full technical analysis. Proof-of-concept code circulates publicly. Exploitation barrier drops to near zero.
- April 30, 2026 -- Shadowserver reports 44,000+ compromised IPs. Mass exploitation confirmed across three continents.
- May 1, 2026 -- CISA adds CVE-2026-41940 to the Known Exploited Vulnerabilities catalog. A 3-day patch deadline is issued to US federal agencies.
- May 2-4, 2026 -- The .sorry ransomware campaign begins large-scale deployment. MSP, government, and military contractor targets confirmed in Philippines, Laos, Canada, South Africa, and the United States.
- May 7, 2026 -- cPanel pre-discloses second Technical Support Release (TSR): CVE-2026-29201, CVE-2026-29202, CVE-2026-29203. InMotion Hosting publishes pre-patch advisory.
- May 8, 2026 -- Second TSR patch released at 12:00 EST. Two emergency patch cycles in 10 days. WHMCS publishes CVE-2026-29204 advisory and releases patched versions 9.0.4 and 8.13.3. The Australian Cyber Security Centre (ACSC) and NHS England Digital issue public alerts about cPanel exposure.
- May 13, 2026 -- WHMCS patch deadline per InMotion advisory. cPanel releases five additional CVE patches including high-severity items.
- May 14, 2026 -- Plesk confirms CVE-2026-42945 (nginx RCE) and CVE-2026-43284 (Dirty Frag kernel LPE) impact its server fleet. Patched nginx package delivery scheduled for May 18, 2026. CVE-2026-31431 (Copy Fail) and CVE-2026-33691 (ModSecurity CRS bypass) remain active for Plesk-hosted environments.
Platform-by-Platform Breakdown
cPanel and WHM
The most severe event of the month. Five CVEs patched in two emergency releases, with a third wave arriving May 13.
CVE-2026-41940 — CVSS 9.8 Critical
Auth bypass via CRLF injection in session file handling. An attacker sends a crafted HTTP Basic Auth header containing CRLF characters. The session daemon writes these characters into the on-disk session file without sanitization, injecting attacker-controlled session fields including user=root. Result: root-level WHM access with no valid password, no 2FA required, and no failed-login log entry generated.
Affected: cPanel/WHM 11.132.x, 11.134.x, 11.136.x and all versions since 11.40 (2013) — Exploited in the wild since February 23, 2026 — Patch released April 30, 2026 — CISA KEV listed May 1, 2026
CVE-2026-29201 — CVSS 4.3 Medium
feature::LOADFEATUREFILE arbitrary file read. The LOADFEATUREFILE directive could be supplied a crafted path argument, enabling an authenticated user to read arbitrary files accessible to the cPanel process.
Patched May 8, 2026 (Second TSR)
CVE-2026-29202 — CVSS 8.8 High
create_user API plugin parameter Perl code execution. A crafted plugin parameter in the create_user API call could be used to execute arbitrary Perl code in the context of the cPanel daemon.
Patched May 8, 2026 (Second TSR)
CVE-2026-29203 — CVSS 8.8 High
Unsafe symlink handling enabling arbitrary chmod. Improper symlink validation in a file management code path allowed an authenticated user to call chmod on arbitrary filesystem paths outside their home directory, enabling privilege escalation through targeted permission manipulation.
Patched May 8, 2026 (Second TSR)
Five Additional CVEs (High Severity) — High
A third wave of patches released May 13, 2026 covers five additional vulnerabilities including high-severity items. Full CVE IDs are pending NVD processing at the time of writing. Per InMotion Hosting pre-patch advisory published ahead of the release.
Patched May 13, 2026
Cumulative cPanel impact for May 2026: Three emergency patch cycles, nine or more CVEs, active exploitation by multiple threat actor groups, ransomware deployment, and alerts from CISA, ACSC, NHS England Digital, and hosting providers on four continents. The .sorry ransomware campaign, which used CVE-2026-41940 as its primary delivery mechanism, left encrypted artifacts visible via open directory listings on 7,135 confirmed cPanel/WHM hosts as of mid-May, per Censys scanning data.
WHMCS
WHMCS is the billing and client management platform used by the majority of cPanel-based hosting operations. It is not a server control panel itself, but it is integral to the hosting stack for hundreds of thousands of operators.
CVE-2026-29204 — Critical -- IDOR / Authorization Bypass
Insecure direct object reference in the client area. An authenticated user can act in another user's context by manipulating object references in client area requests. The exposed data includes services, invoices, billing history, credit card metadata, and customer personally identifiable information. No privilege escalation is required beyond a basic authenticated session.
Affects all versions from 7.4 onward — Versions older than 7.4 are EOL with no patch available — Fixed in WHMCS 9.0.4 and 8.13.3 — Advisory published May 8, 2026
The scope of this vulnerability is significant for multi-tenant hosting operations. WHMCS handles billing data for every client on the platform. An authenticated attacker with access to any client account can traverse to another client's records. In shared hosting environments where accounts are sold to end customers, this means a low-privilege customer can potentially view the billing data, service details, and PII of any other customer on the same WHMCS instance.
Operators running WHMCS versions older than 7.4 have no available patch and should treat those installations as permanently exposed unless they migrate to a supported version. Per the vendor advisory, the fix requires upgrading to 9.0.4 or 8.13.3.
Plesk
Plesk's May 2026 exposure comes from three directions: a critical nginx vulnerability, two Linux kernel local privilege escalation bugs affecting its underlying servers, and an OWASP ModSecurity bypass affecting file upload validation across panel-managed vhosts.
CVE-2026-42945 — Critical -- nginx DoS and RCE
Heap buffer overflow triggered by unnamed regex captures in rewrite rules. nginx versions before 1.31.1 (mainline) and 1.30.1 (stable) contain a heap corruption vulnerability triggered by rewrite rules using unnamed captures. Impact ranges from denial of service to potential remote code execution depending on deployment context.
Affects all nginx versions since 2008 — Plesk-managed patched nginx package scheduled for May 18, 2026 — Manual nginx update available immediately for operators who manage nginx independently
CVE-2026-43284 (Dirty Frag) — Critical -- Linux Kernel LPE
Local privilege escalation in the ESP/ESP6/rxrpc decryption subsystem. A public proof-of-concept achieves root access from an unprivileged user account with a single command. Affects Linux kernels built since 2017. Any shared hosting server where unprivileged users can run code is fully exposed if the kernel is unpatched.
Affects kernels since approximately 2017 — Public PoC actively circulating — Kernel patches available from all major distributions
CVE-2026-31431 (Copy Fail) — Critical -- Linux Kernel LPE
Local privilege escalation in the Linux cryptographic subsystem. Affects kernels since approximately 2017 (kernel 4.14). The vulnerability is in the kernel's copy-on-write handling within a cryptographic code path. Relevant to any Plesk-managed server running an unpatched kernel with multi-tenant user access.
A nine-year-old bug class — Kernel patches available — CloudLinux and major distributions have issued updated kernels
CVE-2026-33691 (ModSecurity CRS Bypass) — High
Whitespace padding in filenames bypasses OWASP CRS extension blocking. Adding whitespace around a file extension in a multipart upload request causes ModSecurity's OWASP Core Rule Set to fail to match the blocked extension pattern. An attacker can upload .php, .phar, .jsp, or .jspx files to servers where those extensions are blocked by WAF rules.
Affects all ModSecurity CRS deployments before updated rules — Interim mitigation: custom rule enforcing strict filename pattern matching without whitespace tolerance
CVE-2026-23918 (Apache HTTP/2 Double-Free) — High
Double-free in the Apache HTTP/2 module, possible remote code execution. A crafted HTTP/2 request sequence can trigger a double-free condition in the Apache http2 module. Exploitation for RCE is considered possible but contextually dependent on deployment configuration.
Relevant to Plesk environments using Apache with HTTP/2 enabled — Apache patch available
DirectAdmin
No DirectAdmin-application-layer CVEs were publicly disclosed in May 2026. DirectAdmin's own codebase does not appear in NVD records for this period. However, DirectAdmin servers share the same underlying Linux kernel exposure as all other panel-managed hosts. The Dirty Frag (CVE-2026-43284), Copy Fail (CVE-2026-31431), and Fragnesia (CVE-2026-46300) kernel local privilege escalation vulnerabilities affect any DirectAdmin server running an unpatched kernel with multi-tenant user access. DirectAdmin's community forum has active mitigation threads for these kernel bugs. The recommended response is identical to all other panel environments: patch the kernel through the distribution's standard update channel.
CyberPanel
CVE-2026-41472 — Medium -- Unauthenticated XSS
Reflected XSS in the AI Scanner dashboard. An unauthenticated attacker can inject arbitrary JavaScript via a crafted URL parameter rendered in the AI Scanner interface. A successful exploit delivers attacker-controlled script in the context of an authenticated admin session if the admin visits the crafted URL.
Affects CyberPanel versions before 2.4.4 — Fixed in CyberPanel 2.4.4
CyberPanel's May 2026 exposure is less severe in isolation than what affected cPanel or Plesk, but CyberPanel has a more significant recent incident history. In October 2024, CVE-2024-51567, a pre-authentication remote code execution vulnerability with a public proof-of-concept, resulted in mass exploitation before patches were widely applied. Operators choosing CyberPanel for cost reasons should weigh that history alongside the current exposure profile.
The Economic Model That Did Not Drive Architectural Modernization
Stepping back from the individual CVEs, May 2026 prompts a structural question: why have the most expensive commercial hosting panels in the market accumulated this level of vulnerability exposure?
The economic history is publicly documented. cPanel shifted from server-based pricing to account-based pricing in 2019, a change that raised costs substantially for operators running dense shared hosting stacks. Subsequent pricing tiers were revised upward in 2021 and again in 2023. WHMCS transitioned to a subscription licensing model with tiered pricing based on client count, and has raised prices at multiple renewal cycles. Plesk operates a per-domain and per-account pricing architecture with multiple product tiers.
Over the same period, all three products have maintained fundamentally the same architectural model they shipped in the 2000s: monolithic control daemons running as root, session state written to the local filesystem, PHP or Perl-based core services, and plugin ecosystems that expand the attack surface with each integration.
This is not a claim that these vendors do not invest in security. They run security teams and release patches. The observation is narrower: the economic incentive structure over the past decade has not driven an architectural shift in the core trust model of these products. Raising prices without changing the underlying security architecture means charging more to maintain the same structural risk profile.
What would genuine architectural modernization look like? Migrating the session layer from filesystem writes to cryptographically signed in-memory tokens would eliminate the structural class of bug that CVE-2026-41940 represents. Replacing monolithic root daemons with isolated service processes would limit blast radius when a compromise occurs. Shipping per-tenant process isolation as a default rather than an optional add-on would contain the damage from kernel-level LPEs in multi-tenant environments. None of these changes are simple or free. But they are the class of investment that changes the threat model rather than patching individual instances of it.
The pattern visible in May 2026 is not a vendor failing to care. It is a product category where the business model has not required the architectural investment that would change the underlying risk profile. That is a rational business decision. It is also one that accumulates security debt over time -- debt that gets serviced in the form of emergency patch cycles, exploitation events, and customer impact.
What Each Audience Should Do This Week
Hosting companies running cPanel or WHM
- Verify the April 30 CVE-2026-41940 patch is applied. Run
whmapi1 versionand confirm you are on a branch released after April 28, 2026. Servers with automatic updates disabled may still be vulnerable. - Apply the May 8 second TSR immediately. Run
/scripts/upcpto pull CVE-2026-29201, 29202, and 29203 patches. - Apply the May 13 patch wave. Five additional CVEs including high-severity items. Same update mechanism.
- Audit logs retroactively from February 23, 2026. Review
/usr/local/cpanel/logs/login_logand access logs on ports 2083 and 2087. CVE-2026-41940 does not generate failed-login entries on success, which makes forensics harder. Look for anomalous session creation patterns from unexpected source IPs after that date. - Search for .sorry artifacts. Run a recursive scan for files with the
.sorryextension across all user home directories. Presence means ransomware was deployed -- treat it as an active incident, not merely a vulnerability event. - Restrict WHM port 2087 to an IP allowlist or VPN. Port 2087 has no legitimate requirement to be open to the public internet for most hosting operations. Network-level restriction reduces attack surface for this and any future auth-layer vulnerability.
- Subscribe to WebPros security notifications to receive pre-disclosure warnings before future TSR cycles.
WHMCS billing operators
- Update to WHMCS 9.0.4 or 8.13.3 immediately. CVE-2026-29204 allows any authenticated client to access another client's billing data, services, and PII. There is no workaround short of updating.
- Rotate all WHMCS API keys and admin credentials after patching. If the vulnerability was exploited before the patch was applied, credentials present in the system should be treated as potentially observed.
- If you are running WHMCS older than 7.4, you are on an end-of-life version with no patch available. Migrate to a supported version immediately.
- Review client area access logs for unusual cross-account request patterns that would indicate exploitation prior to patching.
VPS and dedicated server operators (all panels, including self-managed)
- Patch the kernel for Dirty Frag (CVE-2026-43284). A public proof-of-concept achieves root from an unprivileged user account with a single command. Run
apt upgrade linux-imageon Debian or Ubuntu, or the equivalent command for your distribution. - Patch Copy Fail (CVE-2026-31431). Same update mechanism. Same threat class. Two separate kernel LPE vulnerabilities affecting the same server population simultaneously is an unusual concentration of risk.
- Update nginx to 1.31.1 (mainline) or 1.30.1 (stable) to address CVE-2026-42945. If you run custom rewrite rules with regex patterns, review them for unnamed capture groups.
- Update ModSecurity CRS rules to address the whitespace-padding bypass (CVE-2026-33691). In the interim, add a custom rule enforcing strict filename pattern matching in multipart upload requests.
Agencies and hosting resellers on Plesk
- Wait for the Plesk-managed nginx package on May 18, 2026 if you rely on Plesk-managed nginx delivery. If you manage nginx directly, update now.
- Apply the ModSecurity CRS bypass mitigation immediately. CVE-2026-33691 allows file upload restriction bypass. Any server relying on WAF rules to block executable file uploads is currently relying on a bypassable control.
- Patch the kernel for Copy Fail and Dirty Frag per the distribution update channel. These are not Plesk-specific; they affect any Plesk-managed Linux server.
- Review Apache configuration if you use HTTP/2. CVE-2026-23918 is a double-free in the Apache http2 module with potential RCE implications.
CyberPanel operators and home lab users
- Update to CyberPanel 2.4.4. The CVE-2026-41472 XSS patch is included. Refer to the CyberPanel documentation for the upgrade procedure.
- Patch the kernel for Dirty Frag and Copy Fail. CyberPanel servers are not exempt from kernel-level LPE exposure.
- Review access to the AI Scanner dashboard. Restrict it to authenticated sessions from trusted IPs as a secondary control against the XSS vector.
Where Panelica Fits
Panelica was built from scratch in Go, starting from a different set of architectural assumptions. There is no session file written to a shared filesystem -- the class of vulnerability that CVE-2026-41940 exploits does not exist in the codebase. Authentication uses JWT tokens with cryptographic signing, not on-disk session files that can be manipulated via header injection.
On the tenant escape problem that the May 2026 kernel LPEs highlight: Panelica ships per-user process isolation as a default for every account, on every plan. Each user runs under its own Linux namespace with a private mount point, its own PHP-FPM pool, and its own resource limits. A kernel LPE remains a serious vulnerability regardless of what panel is running on top of it -- kernel patching is mandatory regardless. But the design principle is that a compromise at one tenant's level should not automatically translate into access to another tenant's data or processes. That principle shapes how the codebase handles isolation, and it has been part of the architecture from the start rather than added as an optional module.
There is no plugin marketplace in Panelica. Every service integration is maintained by the same team. The third-party extension attack surface that has been a documented vulnerability source in other panel ecosystems does not exist here by design.
If the events of May 2026 have you evaluating alternatives, Panelica includes 1-click migration from cPanel, Plesk, DirectAdmin, and CyberPanel, with full site, database, email, and DNS transfer. The 14-day free trial requires no credit card. You can get started at panelica.com/try.
The Bottom Line
May 2026 is a month every hosting operator should document and keep on file. A CVSS 9.8 authentication bypass exploited for 65 days before a patch existed. An IDOR in the industry's dominant billing platform exposing cross-customer billing data across millions of installations. Two Linux kernel LPEs with public proof-of-concept code achieving one-command root access. A WAF rule set bypass enabling unrestricted executable file uploads. A critical nginx vulnerability pending a vendor-managed patch that has not shipped as of this writing.
These events did not happen because vendors stopped caring. They happened because legacy architectures accumulate structural risk that individual patches cannot fully resolve. The session file model. The monolithic root daemon. The optional isolation add-on. The third-party extension ecosystem. Each of these is a design decision that made sense in its original context and has since become a category of ongoing security liability.
Patch everything listed in this article. Audit retroactively from February 23. Treat any .sorry-suffixed file as an active incident indicator rather than a minor anomaly. And when the immediate crisis is managed, take the time to evaluate whether the panel powering your infrastructure was designed for the threat model you are operating under today.
For further technical reading on specific vulnerabilities covered here, see our earlier detailed analyses: cPanel's 30-Day Security Storm, Dirty Frag (CVE-2026-43284), and nginx RCE and Fragnesia.