Skip to main content
    • Articles coming soon
< All Topics
Print

There are two major vulnerabilities reported which needs yoyr immediate attention to avoid system compromise. Please note these are OS level and Control Panel level security holes, they should be patched manually based on the provider’s instructions and cannot be patched via any web security suite available, including cPGuard.

CVE-2026-41940: cPanel & WHM Authentication Bypass

CVSS Score: 9.8 (Critical)

Affected Products: cPanel & WHM (versions after 11.40) and WP Squared.

Vulnerability Type: Missing Authentication for Critical Function / CRLF Injection.

Description: An unauthenticated, remote attacker can bypass authentication to gain full administrative (root) access to the cPanel host system, its configurations, databases, and managed websites. The flaw exists in the login and session loading processes; attackers can use a Carriage Return Line Feed (CRLF) injection via a malicious basic authorization header to manipulate the whostmgrsession cookie. This allows them to write arbitrary properties (e.g., user=root) directly into the session file.

Active Exploitation: Yes, actively exploited in the wild.

Fix / Remediation:

Primary: Immediately update cPanel & WHM and WP Squared to the latest patched versions provided by the vendor.

Post-Patching Actions: Purge affected sessions, force password resets for root and WHM users, and check for persistence mechanisms.

Workaround: If immediate patching isn’t possible, block inbound TCP traffic on ports 2083, 2087, 2095, and 2096, or temporarily stop the affected services.

 

CVE-2026-31431: “Copy Fail” Linux Kernel LPE

 CVSS Score: 7.8 (High)

Affected Products: The Linux Kernel (affecting virtually all major distributions since 2017, including Ubuntu, RHEL, Amazon Linux, and SUSE).

Vulnerability Type: Local Privilege Escalation (LPE).

Description: Nicknamed “Copy Fail,” this is a logic flaw in the kernel’s algif_aead userspace cryptographic interface. It allows an unprivileged local user to write four controlled bytes into the page cache of any readable file on a Linux system. By modifying the cached memory of a setuid binary (like /usr/bin/su), an attacker can gain root access in seconds. Unlike “Dirty Pipe,” it does not require winning a race condition and is highly reliable. It poses a severe risk to shared-kernel multi-tenant environments, CI/CD runners, and Kubernetes nodes.

Active Exploitation: Public proof-of-concept (PoC) exploits are widely available and highly effective.

Fix / Remediation:

Primary: Apply the latest kernel security updates provided by your Linux distribution. The patch series reverts the flawed 2017 in-place optimization (ending with commit fafe0fa2995a).

Manual Patching: Do the following steps for the respective OS manually to offload the affected module.

For Ubuntu and Debian systems, the following prevents the vulnerable module from loading into memory.

Disable the module from future loads

echo "install algif_aead /bin/true" > /etc/modprobe.d/cve-2026-31431.conf

Unload the module if it is currently active

rmmod algif_aead

Given below is recommended for CloudLinux, AlmaLinux, and RHEL

Apply the recommended mitigation via grubby

grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

Reboot the server to apply the changes

reboot

Was this article helpful?
5 out of 5 stars

3 ratings

5 Stars 100%
4 Stars 0%
3 Stars 0%
2 Stars 0%
1 Stars 0%
5
How can we improve this article?
Please submit the reason for your vote so that we can improve the article.
Table of Contents