<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[cPanel 高危零日漏洞 CVE-2026-41940 遭野外利用逾两月，CVSS 评分 9.8]]></title><description><![CDATA[<p dir="auto">cPanel 开发商 WebPros International 于 4 月 28 日发布安全公告，披露影响旗下主机控制面板软件 cPanel 及 WHM 的严重认证绕过漏洞，编号 CVE-2026-41940，CVSS 评分 9.8。漏洞根源在于 cPanel 服务守护进程（cpsrvd）的会话文件写入机制存在 CRLF 注入缺陷：攻击者通过构造含有换行字符的恶意 Basic Authorization 请求头，可在认证发生前向磁盘上的会话文件注入任意键值对（如 <code>user=root</code>、<code>hasroot=1</code>），从而绕过密码与双因素认证，以 root 权限接管 WHM 管理界面——整个利用链仅需数个 HTTP 请求，无需任何凭据。受影响范围为 v11.40（2013 年发布）之后的所有版本，以及基于 cPanel 构建的 WordPress 托管平台 WP Squared v136.1.7 之前版本；Shodan 数据显示互联网暴露的 cPanel 实例约达 150 万个。</p>
<p dir="auto">此次漏洞属于真实零日：托管服务商 KnownHost 确认，攻击者最早于 2 月 23 日便已开始利用，早于 4 月 28 日公开披露约两个月。安全研究公司 watchTowr 于 4 月 29 日同步发布技术分析与概念验证代码，CISA 随即将其纳入&quot;已知被利用漏洞&quot;目录。Shadowserver Foundation 监测到 4 月 30 日单日参与扫描及暴力攻击的 IP 数量峰值达 44,000 个，澳大利亚网络安全中心（ACSC）亦确认在澳大利亚境内发现活跃利用。目前各主版本均已发布修复版本（最新稳定版为 11.136.0.5），管理员应立即升级并使用 cPanel 官方 IoC 检测脚本排查是否已遭入侵；临时缓解措施包括在防火墙层面封锁 2083、2087、2095、2096 端口的入站流量。</p>
<p dir="auto"><a href="https://www.helpnetsecurity.com/2026/04/30/cpanel-zero-day-vulnerability-cve-2026-41940-exploited/" target="_blank" rel="noopener noreferrer nofollow ugc">Help Net Security</a> | <a href="https://thehackernews.com/2026/05/critical-cpanel-vulnerability.html" target="_blank" rel="noopener noreferrer nofollow ugc">The Hacker News</a> | <a href="https://www.rapid7.com/blog/post/etr-cve-2026-41940-cpanel-whm-authentication-bypass/" target="_blank" rel="noopener noreferrer nofollow ugc">Rapid7</a></p>
<p dir="auto"><a href="https://www.helpnetsecurity.com/2026/04/30/cpanel-zero-day-vulnerability-cve-2026-41940-exploited/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.helpnetsecurity.com/2026/04/30/cpanel-zero-day-vulnerability-cve-2026-41940-exploited/</a></p>
<p dir="auto"><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://thehackernews.com/2026/05/critical-cpanel-vulnerability.html" title="Critical cPanel Vulnerability Weaponized to Target Government and MSP Networks">
<img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlgjtQddA9U3D-xf2UWj5GKV2R5tEwjqWWY9fwRQi_fZgG5tf140uw2P4oVfmcvPZcMYuFDo1mvqYKkgKSmgfBxVloaWTrN7vgPiH1FX8ivdh8PFBN9LvfJF13a0ajbXDLEV20pr9d2rSoQo4KWbDYSpSOFJYoPYDHizXQ3tYNGVhhysD8h3FWWpOkHytN/s1600/ccc.jpg" class="card-img-top not-responsive" style="max-height: 15rem;" alt="Link Preview Image" onerror="this.parentElement.remove()" />
</a>



<div class="card-body">
<h5 class="card-title">
<a class="text-decoration-none" href="https://thehackernews.com/2026/05/critical-cpanel-vulnerability.html">
Critical cPanel Vulnerability Weaponized to Target Government and MSP Networks
</a>
</h5>
<p class="card-text line-clamp-3">cPanel CVE-2026-41940 exploited within 24 hours, enabling 44,000 IP attacks and data breaches across global networks.</p>
</div>
<a href="https://thehackernews.com/2026/05/critical-cpanel-vulnerability.html" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQQyjwPYjJP0wddSEB8Dlpr3dlnQUs52-WmlrZfqJoBPeOvv2Zoqlq-FhEAz_Xeprj_mtrI1MGCW1JS840JUjVEK6VoNe6zCNNTw_7YmyvNmf3E5pprZ3zqP8lszq74Wt97SvbJo5yeuyep0U6-nGs0vdarg4_WUrc5r6L0ML0xE-BsPipJd2-1PMHTvO1/s32-e365/thn.jpg" alt="favicon" class="not-responsive overflow-hiddden" style="max-width: 21px; max-height: 21px;" onerror="this.remove()"/>

















<p class="d-inline-block text-truncate mb-0">The Hacker News <span class="text-secondary">(thehackernews.com)</span></p>
</a>
</div></p>
]]></description><link>https://welinux.com//topic/214/cpanel-高危零日漏洞-cve-2026-41940-遭野外利用逾两月-cvss-评分-9.8</link><generator>RSS for Node</generator><lastBuildDate>Mon, 18 May 2026 20:46:26 GMT</lastBuildDate><atom:link href="https://welinux.com//topic/214.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 06 May 2026 14:50:30 GMT</pubDate><ttl>60</ttl></channel></rss>