cPanel is a very popular hosting framework which is often very difficult to avoid exposing to the internet. The exploit for this weakness gives the attacker root access to cPanel (and from there easy RCE on the system), and the exploit is reliable, well documented, and affects all versions of cPanel except the latest patch. There are well over a million hosts exposed, and though cPanel does have some automated self-upgrade functionality, it can be turned off, and the window before an upgrade (usually up to 24h) is long enough for attacker to have already exploited this weakness. cPanel have provided a script you can use to detect if compromise has already occurred, which can be found here.
Vulnerability intelligence
Updated 44 minutes ago
FeedsTrending now
CVEs trending on social media within the last 24 hours
Hypemeter
Current score
It's warming up
1
CVE-2025-54957 Published Oct 20, 2025Hype score
30
critical 9.8
Dolby UDCDD+ DecoderEvolutionCVE-2025-54957 is a buffer overflow vulnerability affecting Dolby Universal Decoder Core (UDC) versions 4.5 through 4.13. The flaw resides within the Dolby Digital Plus (DD+) decoder process and can be triggered by processing specially crafted, malformed DD+ bitstreams. Specifically, an integer overflow occurs during the length calculation when the `evo_priv.c` component parses "Evolution data" from the DD+ bitstream. This results in an undersized buffer being allocated, which then renders subsequent out-of-bounds checks ineffective and leads to an out-of-bounds write condition. Google Project Zero researchers discovered this vulnerability, highlighting its potential for zero-click exploitation on mobile devices, as audio attachments and voice messages are often decoded automatically.
2
CVE-2026-43284 Published May 8, 2026Hype score
29
high 8.8
ServerUbuntuContainer SecurityESPDirty FragCVE-2026-43284, also known as part of the "Dirty Frag" vulnerability, is a flaw identified in the Linux kernel's xfrm-ESP subsystem. This vulnerability arises from an issue where the kernel performs in-place decryption on shared `skb` (socket buffer) fragments. Specifically, when `MSG_SPLICE_PAGES` attaches pages from a pipe directly to an `skb`, the IPv4/IPv6 datagram append paths failed to mark these `skbs` with `SKBFL_SHARED_FRAG` when splicing pages into UDP `skbs`. This oversight causes the ESP input path to decrypt data in place over buffers that are not privately owned by the `skb`, allowing unprivileged processes to retain references to the resulting plaintext. This mechanism effectively provides a write primitive into the page cache. The vulnerability was introduced in January 2017 and is related to a fast path for IPsec ESP receive. It is often discussed in conjunction with CVE-2026-43500, as the combination of these two flaws can be leveraged for local privilege escalation by manipulating the page cache to corrupt privileged files.
3
CVE-2026-43500 Published May 11, 2026Hype score
29
high 7.8
ServerUbuntuCVE-2026-43500 is a vulnerability found within the Linux kernel's RxRPC networking subsystem, forming one half of a pair of flaws collectively dubbed "Dirty Frag." This issue arises when a non-linear socket buffer, which carries a splice-pinned page-cache reference, reaches the RxRPC authentication verification path. Instead of isolating the buffer, the kernel performs an in-place decryption directly on the referenced page-cache page. This behavior can be exploited by an unprivileged local attacker to corrupt the contents of the page-cache. By manipulating cached data in memory, an attacker could potentially overwrite sensitive system files, such as `/etc/passwd`, to achieve unauthorized access or escalate privileges.
Known exploited
Sourced from CISA's Known Exploited Vulnerability (KEV) catalog.
- CVE-2026-42208 Published May 8, 2026
critical 9.3
Exploit known
ServerSQL injectionLiteLLMZero-dayOpenAIDatabaseLiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version 1.81.16 to before version 1.83.7, a database query used during proxy API key checks mixed the caller-supplied key value into the query text instead of passing it as a separate parameter. An unauthenticated attacker could send a specially crafted Authorization header to any LLM API route (for example POST /chat/completions) and reach this query through the proxy's error-handling path. An attacker could read data from the proxy's database and may be able to modify it, leading to unauthorised access to the proxy and the credentials it manages. This issue has been patched in version 1.83.7.
- CVE-2026-31431 Published Apr 22, 2026
Hype score
29
high 7.8
Exploit known
Amazon RedshiftLinux KernelZero-dayContainer SecurityServerUbuntuSSHPort (22)algif_aeadCloudTlsTunneling protocolCVE-2026-31431, dubbed "Copy Fail," is a local privilege escalation (LPE) vulnerability found within the Linux kernel's cryptographic subsystem. Specifically, it stems from a logic flaw in the `algif_aead` module of the `AF_ALG` (userspace crypto API), which leads to improper memory handling during in-place operations. This flaw allows an unprivileged local user to perform a deterministic, controlled 4-byte write into the page cache of any readable file on the system, including setuid binaries. This vulnerability has been present in Linux kernels since 2017 and impacts a wide range of major distributions, including Red Hat, SUSE, Ubuntu, and Amazon Linux. Exploitation is described as reliable, not requiring race conditions or kernel-specific offsets, and can be achieved with a small Python script. The in-memory corruption means the file on disk remains unchanged, and typical on-disk checksums would not detect the modification.
- CVE-2026-41940 Published Apr 29, 2026
critical 9.3
Exploit known
web applicationZero-daycPanelWHMlmsCVE-2026-41940 is an authentication bypass vulnerability impacting cPanel & WHM and WP Squared products. This flaw allows unauthenticated remote attackers to bypass the login process and gain unauthorized administrative access to affected systems. The vulnerability stems from a Carriage Return Line Feed (CRLF) injection within the login and session loading mechanisms of cPanel & WHM, where an attacker can manipulate the `whostmgrsession` cookie to circumvent encryption. Successful exploitation of CVE-2026-41940 grants an attacker control over the cPanel host system, including its configurations, databases, and the websites it manages. Security firm watchTowr Labs has published a technical analysis and proof-of-concept exploit for this vulnerability, detailed in their blog post titled "The Internet Is Falling Down, Falling Down, Falling Down (cPanel & WHM Authentication Bypass CVE-2026-41940)". The vulnerability affects cPanel and WHM versions after 11.40, with patches available in later versions.
Insights
See moreOur Security Team's most recent CVE analysis
- Link to CVE page
CVE-2026-41940
critical 9.3
Exploit known
Intruder Insights
Updated Apr 30, 2026
- Link to CVE page
CVE-2026-1340
critical 9.8
Exploit known
Intruder Insights
Updated Jan 30, 2026
This and the similar vulnerability CVE-2026-1281 allow an unauthenticated attacker to execute code remotely on unpatched Ivanti EPMM instances.
A patch is available from Ivanti here and should be installed immediately. There is a page for defenders who need to check if their instance has been compromised here, though this is a work in progress.
Note that this is a temporary patch which will be removed with further version updates. If you update the version of your EPMM instance after patching, you must apply the patch again. A fully patched version of EPMM will be available in future which will permanently fix the vulnerability.
This vulnerability was known to be used in the wild before being disclosed by the vendor. Proof of concept code is now available publicly, so increased attack activity is expected.
- Link to CVE page
CVE-2026-1281
critical 9.8
Exploit known
Intruder Insights
Updated Jan 30, 2026
This and the similar vulnerability CVE-2026-1340 allow an unauthenticated attacker to execute code remotely on unpatched Ivanti EPMM instances.
A patch is available from Ivanti here and should be installed immediately. There is a page for defenders who need to check if their instance has been compromised here, though this is a work in progress.
Note that this is a temporary patch which will be removed with further version updates. If you update the version of your EPMM instance after patching, you must apply the patch again. A fully patched version of EPMM will be available in future which will permanently fix the vulnerability.
This vulnerability was known to be used in the wild before being disclosed by the vendor. Proof of concept code is now available publicly, so increased attack activity is expected.