Hackers Abuse CVE-2026-41940 to Take Over cPanel and WHM Servers

In Cybersecurity News - Original News Source is cybersecuritynews.com by Blog Writer

Spread the love

A fatal authentication bypass vulnerability is actively affecting cPanel and WebHost Manager (WHM) servers worldwide.

Tracked as CVE-2026-41940 and bearing an apocalyptic maximum severity score of 9.8, this critical flaw has essentially handed the keys to the kingdom directly to cybercriminals.

Without needing a single username or password, unauthenticated remote attackers are ruthlessly shattering security perimeters to seize absolute administrator control.

Threat actors are now aggressively weaponizing this zero-day exploit, unleashing a tidal wave of ransomware, parasitic cryptominers, and deeply embedded backdoors across vulnerable Linux environments.

Since its public disclosure in late April 2026, threat intelligence platforms have observed a massive surge in automated attacks targeting this vulnerability.

DailyDarkWeb reports that over 2,000 unique IP addresses worldwide, primarily originating from the United States, Germany, Brazil, and the Netherlands, are actively scanning for and exploiting this flaw.

Highlighting the severity of the threat, security researchers at Ctrl-Alt-Intel revealed on May 2.

That hackers successfully weaponized this vulnerability to breach Southeast Asian government and military networks, stealing nearly 4.37 GB of sensitive archives dating from 2020 to 2024.

CVE-2026-41940 Hijacks cPanel Servers

Security analysts from XLab have attributed a highly sophisticated, ongoing campaign to a covert hacking collective internally dubbed “Mr_Rot13”.

Operating quietly since at least 2020, this group has a history of deploying malicious PHP backdoors that completely evade detection on major antivirus scanning platforms.

JavaScript code is injected (Source: Xlab)

The group earned its moniker by frequently using the Rot13 algorithm to obfuscate its command-and-control (C2) infrastructure within injected JavaScript payloads.

Recent investigations reveal that Mr_Rot13 is a highly organized operation rather than an opportunistic script-kiddie ring.

The group relies on custom, well-maintained malware and reacts dynamically to security researchers probing their infrastructure.

For example, they frequently rotate their Telegram bot tokens and upgrade their malware payloads to evade active detection and analysis.

The infection process begins when attackers exploit CVE-2026-41940 to bypass authentication, granting them immediate administrator privileges on the target server.

Without providing a username or password, the threat actors deploy a Go-based injector tool named “Payload.”

Researchers from XLab note that the code structure and logging style of this tool appear to be generated by artificial intelligence.

Remotely manage compromised systems via a web page (Source: Xlab)

Once executed, the injector immediately alters the server’s root password and implants malicious SSH public keys to ensure persistent backdoor access.

The malware then drops a custom PHP webshell known as “Cpanel-Python”. It injects malicious JavaScript into the server’s custom login pages.

This injected script actively steals user credentials, User-Agent strings, and URLs, forwarding the stolen data to a remote C2 server via an AJAX request.

As a final step, the attackers deploy “Filemanager,” a powerful cross-platform remote control Trojan.

This Trojan supports Linux, Windows, and Darwin operating systems, allowing attackers to access a web-based console to execute remote commands and manage files.

Stolen server configurations and database credentials are then exfiltrated through dual channels, sending information back to both the group’s web domains and a dedicated Telegram bot.

Indicators of Compromise (IOCs):

Domains:

  • cp.dene.de[.]com
  • wrned[.]com
  • wpsock[.]com

MD5 Hashes:

  • fb1bc3f935fdeb3555465070ba2db33c
  • 9305b4ebbb4d39907cf36b62989a6af3
  • 2286f126ab4740ccf2595ad1fa0c615c

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Follow us on Google News, LinkedIn, and X to Get More Instant Updates.


Discover more from Cryptika Cybersecurity

Subscribe to get the latest posts sent to your email.