CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

cPanel and WHM Arbitrary Code Execution and Privilege Escalation Vulnerabilities (CVE-2026-29201, CVE-2026-29202, CVE-2026-29203) Patched

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

cPanel and WHM released updates addressing three vulnerabilities—CVE-2026-29201, CVE-2026-29202, and CVE-2026-29203—with potential for arbitrary file read, arbitrary Perl code execution, denial-of-service, and privilege escalation. The flaws arise from insufficient input validation and unsafe symlink handling, impacting multiple versions of cPanel and WHM. Users are urged to update to patched versions immediately due to the severity and historical exploitation of similar issues.

Timeline

  1. 09.05.2026 10:16 1 articles · 2h ago

    cPanel and WHM Release Patches for Privilege Escalation, Code Execution, and DoS Vulnerabilities (CVE-2026-29201, CVE-2026-29202, CVE-2026-29203)

    cPanel and WHM released updates addressing three vulnerabilities—CVE-2026-29201 (arbitrary file read), CVE-2026-29202 (arbitrary Perl code execution), and CVE-2026-29203 (denial-of-service/privilege escalation via unsafe symlink handling). Affected versions span multiple branches, with direct patch 110.0.114 for legacy CentOS 6/CloudLinux 6 systems. While no active exploitation is reported, historical weaponization of a related flaw highlights the urgency for immediate updates.

    Show sources

Information Snippets