CVE-2026-41940 Vulnerability in cPanel Exploited to Steal Credentials

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer
Key Takeaways
  • Critical cPanel vulnerability: CVE-2026-41940 maintains a 9.8 CVSS score and facilitates complete administrative privilege escalation.
  • Global attack infrastructure: Threat intelligence analysis documented over 2,000 attacking source IP addresses across multiple geographies.
  • Mr_Rot13 threat actor identification: The adversary deploys sophisticated multi-stage loaders, webshells, and cross-platform persistence mechanisms.

QiAnXin XLab has documented an active threat group, designated Mr_Rot13, exploiting CVE-2026-41940. The vulnerability impacting cPanel and WHM management infrastructure maintains a 9.8 CVSS score and enables unauthenticated remote authentication bypass, providing adversaries with complete administrative control. 

Following public disclosure on April 28, 2026, XLab telemetry documented over 2,000 attacking source IP addresses distributed globally, with primary concentration in Germany, the United States, Brazil, and the Netherlands. 

Payload Delivery Mechanism and System Compromise

On May 4, XLab identified a Go-based loader component named Payload. The loader incorporates Turkish debugging strings and exhibits characteristics consistent with AI-generated code segments. 

Payload remote update | XLab
Payload remote update | XLab

During the execution phase, Payload retrieved a secondary component named Update from the command and control (C2) infrastructure “cp.dene.de.com.” The infector’s main tasks are:

The malware collects sensitive information from the compromised system  | XLab
The malware collects sensitive information from the compromised system  | XLab

Ultimately, it steals bash history, SSH records, device information, database passwords, and Valiases configurations. The malware subsequently transmitted harvested credentials to “wrned.com” and an adversary-controlled Telegram communication channel.

Attacker Identification

XLab designated the threat group Mr_Rot13 based on the Telegram handle 0xWR and the group's implementation of ROT13-obfuscated C2 communications. In addition to the primary infection vector, the adversaries deployed a cross-platform “filemanager” backdoor component.

Researchers discovered that the creator of this group is 0xWR | Source: XLab
Researchers discovered that the creator of this group is 0xWR | Source: XLab

Research analysis established an infrastructure correlation with a PHP backdoor with zero detections since 2022 that maintained communications with “wrned.com” – a domain that had been in use since 2020. This indicated a stable hacking group instead of opportunistic "hit-and-run" scriptsters.

The cPanel security update announced patches, and system administrators using cPanel and WHM must prioritize deploying emergency patches. 

CVE-2026-41940 is currently under active mass exploitation, and forensic analysis indicates that it began as early as February 2026, significantly preceding public disclosure. 


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: