The cPanel CVE-2026-41940 authentication bypass is live on 1.5 million servers, actively exploited since at least February 23 with no credentials required and a public proof-of-concept now available. Rapid7 confirmed the scale via Shodan on April 29, one day after cPanel published its advisory, meaning defenders faced a 64-day exploitation window with no official guidance.

CVE-2026-41940 works by manipulating the whostmgrsession cookie and injecting raw carriage-return and line-feed characters through the basic authorization header, allowing an attacker to insert arbitrary session properties, including a root-level user token, without any password. WatchTowr disclosed the technique. Rapid7 researcher Ryan Emmons independently verified the mechanism and confirmed the number of internet-facing instances via Shodan scans.

Four additional threats make this one of the heaviest weeks of 2026 for defenders. UNC6692 is deploying a three-component malware suite called Snow through Microsoft Teams social engineering, pivoting from initial access to Active Directory extraction in one continuous kill chain. A CVSS 9.3 SQL injection flaw in the LiteLLM AI proxy package, CVE-2026-42208, was exploited in the wild within 36 hours of public disclosure. ShinyHunters listed more than 40 new victim organizations on its data leak site, including Carnival Corporation's Holland America Line subsidiary and 8.7 million customer records. And CISA added 13 vulnerabilities to its Known Exploited Vulnerabilities catalog in a four-day window spanning April 20 to 24.

Patch cPanel before end of business today.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts — distilled for practitioners. 50,000+ subscribers. No noise.

How cPanel CVE-2026-41940 Gives Attackers Root on 1.5 Million Servers

CVE-2026-41940 is a critical authentication bypass vulnerability in cPanel and WHM affecting all versions released after v11.40, as well as WP Squared v136.1.7, the managed WordPress hosting platform built on cPanel infrastructure. Successful exploitation gives an attacker complete control over the cPanel host system, its configurations and databases, and every website it manages.

The attack technique, disclosed by WatchTowr and analyzed independently by Rapid7 researcher Ryan Emmons, works in two steps. An attacker first manipulates the whostmgrsession cookie by omitting an expected segment from its structure. They then inject raw carriage-return and line-feed characters via a malicious basic authorization header, inserting arbitrary key-value properties, including a root user token, directly into the server's session files. The result is a fully authenticated root session with no password required.

Rapid7 confirmed via Shodan that approximately 1.5 million cPanel instances are exposed online, though patch levels vary across that population. Active exploitation has been confirmed since at least February 23, 2026, and researchers note the actual exploitation window likely predates that date. A proof-of-concept exploit is now publicly available, which increases risk for every unpatched instance. cPanel published its advisory and a patched release on April 28, 2026.

Remediation: Update cPanel to the patched version immediately and restart the cpsrvd service. If immediate patching is not possible, block ports 2083, 2087, 2095, and 2096 at the perimeter firewall. Run cPanel's provided compromise-detection script on all exposed instances before assuming they are clean. CISA has added CVE-2026-41940 to the KEV catalog.

Attackers can manipulate the whostmgrsession cookie by omitting an expected segment and inject raw carriage-return and line-feed characters via malicious basic authorization headers, enabling them to insert arbitrary properties like 'user=root' into session files.

Ryan Emmons, Security Researcher, Rapid7

How Snow Malware Turns Microsoft Teams Into a Backdoor Delivery Channel

Snow malware is a three-component backdoor suite deployed by UNC6692, a threat actor tracked by Google Mandiant that uses Microsoft Teams social engineering as its primary access vector. UNC6692 begins each intrusion by flooding the target's email inbox to create urgency and confusion, then contacts the overwhelmed victim via Teams posing as an IT helpdesk agent. The attacker instructs the victim to click a link for a supposed security patch, triggering the Snow malware installation chain.

The Snow suite consists of three tools operating in concert. SnowBelt is a malicious Chrome browser extension that enables persistent access to browser sessions and data. SnowGlaze is a SOCKS proxy tunneler that routes arbitrary TCP traffic through the infected host, giving UNC6692 a covert channel for sustained operations. SnowBasin is a Python-based backdoor that executes CMD and PowerShell commands, enables remote shell access, performs file management, captures screenshots, and extracts credentials from the local system.

Post-compromise, UNC6692 conducts internal reconnaissance targeting SMB and RDP services, then moves laterally through the network using pass-the-hash authentication after dumping LSASS memory. The group extracts the Active Directory database using FTK Imager and exfiltrates data via LimeWire. Google Mandiant has published extensive indicators of compromise and YARA rules for detecting the Snow toolkit, available through BleepingComputer's reporting.

Organizations should immediately restrict Microsoft Teams external access to verified domains only, audit endpoints for anomalous Chrome extensions and Python execution chains, and train staff that legitimate IT support does not deliver security patches through Teams chat links.

1

Email Bombing

UNC6692 floods the target's email inbox with high volumes of messages to create urgency and make the victim receptive to an IT intervention.

2

Teams Impersonation

The attacker contacts the overwhelmed victim via Microsoft Teams posing as an IT helpdesk agent, directing them to click a link for a fake security patch that deploys the Snow malware suite.

3

Deep Compromise and Exfiltration

Snow components establish persistence, dump LSASS credentials, perform pass-the-hash lateral movement, extract the Active Directory database with FTK Imager, and exfiltrate data via LimeWire.

LiteLLM CVE-2026-42208: AI Infrastructure Exploited Within 36 Hours of Disclosure

CVE-2026-42208 is a CVSS 9.3 SQL injection vulnerability in BerriAI's LiteLLM Python package, a widely deployed proxy that routes AI inference requests across multiple large language model providers including OpenAI, Anthropic, and Azure OpenAI. Security researchers identified active exploitation of LiteLLM CVE-2026-42208 within 36 hours of public disclosure, making it one of the fastest-weaponized vulnerabilities documented in 2026.

The flaw allows an unauthenticated attacker to inject SQL commands that modify the underlying LiteLLM proxy database. In production environments, this database typically stores API keys, model configurations, usage logs, and organizational routing rules. Successful exploitation could expose all API credentials managed through the proxy, inject malicious model routing configurations, or corrupt usage data relied upon for billing and access control.

LiteLLM is prevalent in enterprise AI pipelines, internal LLM gateways, and managed AI services. Organizations that have not isolated LiteLLM instances behind authenticated network controls or have not updated to the patched release should treat any LiteLLM database as potentially compromised. Rotate all API keys stored in or passed through the proxy immediately after patching. This vulnerability also applies to any derivative or vendor-bundled version of the LiteLLM package.

This exploitation pattern, critical AI infrastructure targeted within hours of a public CVE, reflects a deliberate shift by threat actors toward foundational services rather than end-user applications. Organizations should apply the same emergency patching discipline to AI infrastructure components that they apply to web servers and VPN appliances.

ShinyHunters Claims 40 Organizations and 8.7 Million Records in One Week

ShinyHunters is a financially motivated cybercriminal group specializing in large-scale data theft and extortion, responsible for some of the most significant breach disclosures of the past three years. This week the group listed more than 40 new victim organizations on its data leak site, the largest single-week expansion of its victim portfolio in 2026.

Confirmed victims include Carnival Corporation's Holland America Line subsidiary, where 8.7 million customer records were exposed. Additional organizations listed this week include Mytheresa, Pitney Bowes, The Canada Life Assurance Company, Hallmark, and Inditex, the parent company of global fashion retailer Zara. The campaign also swept through major retailers, insurers, and hospitality firms across North America and Europe.

This expansion follows a series of high-profile ShinyHunters breaches already covered on Decryption Digest this year, including the [Amtrak Salesforce breach affecting 9 million records](/blog/amtrak-shinyhunters-salesforce-breach-9-million-records) via compromised OAuth tokens. The group consistently exploits credential theft at third-party SaaS platforms rather than attacking victims' own perimeters, which makes detection through traditional network-layer monitoring ineffective.

Organizations in retail, insurance, and hospitality should audit all third-party SaaS platform access and review Salesforce and CRM access logs for anomalous OAuth activity. Confirm that multi-factor authentication is enforced on all external-facing platforms, and verify with your vendors that any shared data exposure has been assessed for your specific tenant.

From the EU Commission to global enterprises, in April 2026 attackers demonstrated a relentless ability to exploit weaknesses across government bodies, healthcare providers, travel platforms, and critical technology environments.

CM-Alliance, April 2026 Cyber Incidents Report

CISA Adds 13 Vulnerabilities to KEV This Week: Which to Prioritize

CISA added 13 vulnerabilities to its Known Exploited Vulnerabilities catalog in a four-day window spanning April 20 to 24, 2026. Each addition carries evidence of active exploitation. BOD 22-01 requires Federal Civilian Executive Branch agencies to remediate all KEV entries by their assigned deadlines. Private sector organizations should treat the KEV list as a prioritization signal for their own patch cycles.

On April 20, CISA added eight vulnerabilities. The highest-priority entries for enterprise defenders include CVE-2023-27351, an authentication bypass in PaperCut NG/MF used widely for enterprise print management; CVE-2024-27199, a JetBrains TeamCity authentication bypass enabling remote code execution on build servers; CVE-2025-48700, an authentication flaw in Synacor Zimbra; and three vulnerabilities in Cisco Catalyst SD-WAN Manager. The April 20 batch also included Kentico Xperience CVE-2025-2749 and Quest KACE SMA CVE-2025-32975.

On April 23, CISA added CVE-2026-39987, a remote code execution vulnerability in Marimo, the open-source Python notebook platform. On April 24, CISA added four more vulnerabilities covering Samsung MagicINFO 9 digital signage software, SimpleHelp remote support software, and D-Link DIR-823X router firmware.

For broader context on the Microsoft vulnerabilities patched this month, see the [April 2026 Patch Tuesday coverage](/blog/patch-tuesday-april-2026) on Decryption Digest, which details the 167-flaw release including the SharePoint Server zero-day CVE-2026-32201.

CVE-2023-27351 — PaperCut NG/MF Authentication Bypass

Unauthenticated access to enterprise print management systems. High asset exposure in large organizations. Apply vendor patch immediately and restrict management console access to trusted networks.

CVE-2024-27199 — JetBrains TeamCity RCE

Authentication bypass enabling remote code execution on CI/CD build servers without credentials. Critical for software supply chain integrity. Apply vendor patch and audit recent build history for unauthorized modifications.

CVE-2025-48700 — Synacor Zimbra Authentication Flaw

Authentication weakness in Zimbra Collaboration Suite affecting email and calendar infrastructure. Apply patch before May 12 CISA deadline and rotate admin credentials.

CVE-2026-39987 — Marimo Remote Code Execution

RCE in the open-source Python notebook platform. Particularly relevant for data science and AI workflow environments. Update to patched release immediately.

Samsung MagicINFO 9 + SimpleHelp + D-Link DIR-823X

Three vulnerabilities from the April 24 KEV batch covering digital signage, remote support platforms, and SOHO routers. Prioritize based on which products exist in your environment.

Key IOCs From This Week's Active Campaigns

The following indicators of compromise are derived from published technical disclosures for this week's top five threats. Run these against your SIEM, EDR, and firewall logs immediately. The full Snow malware IOC set and YARA detection rules published by Google Mandiant are available through BleepingComputer's reporting linked in the sources section below. For cPanel, the primary network-layer mitigation is port-based blocking until the patch is applied.

Indicators of Compromise
ArtifactTypeSHA-256 (Truncated)
Port 2083 (cPanel SSL)Network — Block at Perimeter FirewallCVE-2026-41940
Port 2087 (WHM SSL)Network — Block at Perimeter FirewallCVE-2026-41940
Port 2095 (cPanel Webmail)Network — Block at Perimeter FirewallCVE-2026-41940
Port 2096 (cPanel Webmail SSL)Network — Block at Perimeter FirewallCVE-2026-41940
SnowBasin Python backdoorFile — YARA Detection via MandiantUNC6692 Snow Malware
SnowGlaze SOCKS tunnelerFile — YARA Detection via MandiantUNC6692 Snow Malware
SnowBelt Chrome extensionBrowser Extension — Anomalous InstallUNC6692 Snow Malware
FTK Imager on non-forensics endpointProcess — Suspicious ExecutionUNC6692 Post-Compromise
LSASS dump from non-admin processProcess — Credential Theft SignalUNC6692 Post-Compromise

Any instance of msimg32.dll found outside C:\Windows\System32 is an active IOC. Isolate the host immediately. Full hashes and IOC lists are available via the Cisco Talos GitHub repository.

Weekend Remediation Checklist: 7 Steps Before Monday Morning

This week's threat landscape contains three actively exploited vulnerabilities and two confirmed active campaigns. The following steps address the highest-risk exposures identified across all five threats in this briefing. Execute in order of your asset exposure.

Patch cPanel CVE-2026-41940

Update all cPanel and WHM instances to the patched release. Restart cpsrvd. Run the cPanel compromise-detection script on all instances. If patching cannot happen today, block ports 2083, 2087, 2095, and 2096 at the firewall immediately.

Update LiteLLM and rotate all API keys

Apply the patched LiteLLM release and rotate every API key stored in or passed through the proxy, including OpenAI, Anthropic, and Azure OpenAI credentials. Audit the proxy database for unauthorized modifications before bringing services back online.

Restrict Microsoft Teams external access

Review Teams external access policies and restrict communications to verified external domains only. Brief staff that IT support does not deliver security patches through Teams chat links.

Hunt for Snow malware on endpoints

Search EDR telemetry for SnowBasin Python execution, SnowGlaze SOCKS proxy connections, anomalous Chrome extension installs, LSASS dumps from non-admin processes, and FTK Imager execution on non-forensics systems.

Audit SaaS OAuth tokens and CRM access logs

Review Salesforce and other SaaS platform access logs for anomalous OAuth activity consistent with ShinyHunters credential theft patterns. Enforce MFA on all external-facing platforms and contact affected vendors to confirm your tenant's exposure status.

Apply CISA KEV patches matching your tech stack

Cross-reference the 13 CISA KEV additions from April 20 to 24 against your asset inventory. Prioritize PaperCut NG/MF, JetBrains TeamCity, Zimbra, and Samsung MagicINFO 9 for immediate remediation based on your environment.

Verify backup integrity and test offline restore

Given ShinyHunters' data extortion campaign hitting retail, insurance, and hospitality, confirm that critical data has clean offline backups not accessible from third-party SaaS environments that may already be compromised.

The bottom line

The cPanel CVE-2026-41940 authentication bypass is the most immediately dangerous exposure in this week's briefing: 1.5 million servers facing a public exploit, active exploitation dating back 64 days before the advisory, and complete root access as the attacker's reward. UNC6692's Snow malware confirms that Microsoft Teams is now a primary enterprise attack surface requiring the same scrutiny as email. LiteLLM CVE-2026-42208 signals that AI infrastructure is a first-class exploitation target in 2026. Update every cPanel and WHM instance in your environment before end of business today.

Frequently asked questions

What is CVE-2026-41940?

CVE-2026-41940 is a critical authentication bypass vulnerability in cPanel and WHM, the web-based hosting control panel used by millions of websites worldwide. The flaw affects all versions after v11.40 and WP Squared v136.1.7. It allows an unauthenticated attacker to manipulate session cookies and inject arbitrary session properties, including admin-level credentials, without providing a password. Successful exploitation gives the attacker full root control over the server, its databases, and every hosted website.

Is cPanel CVE-2026-41940 being actively exploited right now?

Yes. CyberScoop and Help Net Security confirmed active exploitation of CVE-2026-41940 since at least February 23, 2026, more than two months before cPanel published its advisory on April 28. Rapid7 identified approximately 1.5 million cPanel instances exposed online via Shodan. A proof-of-concept exploit is now publicly available, which CISA warns significantly increases exploitation risk across all unpatched servers.

How do I patch CVE-2026-41940?

Update your cPanel and WHM installation to the latest patched version immediately. After updating, restart the cpsrvd service to invalidate any existing malicious sessions. If you cannot patch right away, block ports 2083, 2087, 2095, and 2096 at your perimeter firewall to restrict external access to the control panel. Run cPanel's provided compromise-detection script on all exposed instances to check for prior exploitation before assuming they are clean.

What is Snow malware?

Snow malware is a three-component backdoor suite deployed by threat actor UNC6692 through Microsoft Teams social engineering. It consists of SnowBelt, a malicious Chrome extension; SnowGlaze, a SOCKS proxy tunneler; and SnowBasin, a Python-based backdoor. Together they enable remote shell access, credential theft, lateral movement, LSASS memory dumping, Active Directory extraction, and data exfiltration. Google Mandiant published indicators of compromise and YARA rules for detecting the Snow toolkit.

How does UNC6692 deliver Snow malware via Microsoft Teams?

UNC6692 first floods a target's email inbox to create urgency, then contacts the victim via Microsoft Teams posing as an IT helpdesk agent. The attacker directs the victim to click a link for a fake security patch. Once the victim complies, the Snow malware suite is deployed. Post-compromise activity includes LSASS memory dumps for credential extraction, pass-the-hash lateral movement, Active Directory database extraction using FTK Imager, and data exfiltration via LimeWire.

What is LiteLLM CVE-2026-42208?

CVE-2026-42208 is a CVSS 9.3 SQL injection vulnerability in BerriAI's LiteLLM Python package, a widely used proxy that routes requests across multiple large language model providers. The flaw allows an attacker to inject SQL commands that modify the underlying LiteLLM proxy database, which typically stores API keys, model routing configurations, and usage logs. It was exploited in the wild within 36 hours of public disclosure.

Which organizations did ShinyHunters breach this week?

ShinyHunters listed more than 40 organizations on its data leak site during the week of April 25 to May 1, 2026. Confirmed victims include Carnival Corporation's Holland America Line subsidiary with 8.7 million records exposed, Mytheresa, Pitney Bowes, The Canada Life Assurance Company, Hallmark, and Inditex, the parent company of Zara. The campaign targeted major retailers, insurers, and hospitality firms across North America and Europe.

Which CISA KEV additions should I prioritize this week?

Prioritize based on your technology stack. The highest priority is cPanel CVE-2026-41940 for any hosting environments. For enterprise environments, focus on CVE-2023-27351 in PaperCut NG/MF, CVE-2024-27199 in JetBrains TeamCity, and CVE-2025-48700 in Synacor Zimbra from the April 20 batch. Samsung MagicINFO 9 and SimpleHelp from the April 24 batch are relevant for organizations running digital signage or remote support platforms.

Sources & references

  1. Help Net Security — cPanel Zero-Day CVE-2026-41940 Exploited for Months Before Patch
  2. CyberScoop — cPanel Authentication Bypass Bug Is Being Exploited in the Wild, CISA Warns
  3. BleepingComputer — Threat Actor Uses Microsoft Teams to Deploy New Snow Malware
  4. The Hacker News — CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines
  5. CM-Alliance — Major Cyber Attacks, Data Breaches, Ransomware Attacks in April 2026
  6. CISA — Known Exploited Vulnerabilities Catalog
  7. BleepingComputer — Critical cPanel and WHM Bug Exploited as a Zero-Day, PoC Now Available

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Get tomorrow's threat briefing before your inbox does.