Critical cPanel Vulnerability Under Active Exploitation
A critical authentication bypass vulnerability in cPanel software has been exploited as a zero-day for at least 30 days before public disclosure, putting millions of websites at risk through compromised hosting infrastructure. CVE-2026-41940, assigned a CVSS score of 9.8, affects all supported versions of cPanel, WebHost Manager (WHM), and WP Squared products.
According to Dark Reading, the vulnerability allows attackers to gain administrative access and take complete control of servers and hosted websites. Multiple proof-of-concept exploits appeared within 24 hours of the April 28 security update, with Internet scanning from Censys showing attacks from various threat actors immediately following disclosure.
KnownHost CEO Daniel Pearson confirmed on Reddit that approximately 30 servers showed exploitation signs dating back to February 23, indicating the flaw was actively exploited for months before patches became available. WatchTowr Labs published a detailed technical analysis describing the vulnerability as a “disaster” flaw.
Linux Copy Fail Vulnerability Gains CISA Attention
CISA added CVE-2026-31431, dubbed “Copy Fail,” to its Known Exploited Vulnerabilities catalog on Friday, requiring federal agencies to patch within two weeks. The Linux kernel vulnerability, which lurked undetected for nearly a decade, affects all Linux distributions since 2017.
According to SecurityWeek, the flaw impacts the kernel’s authencesn AEAD template, allowing authenticated attackers with code execution privileges to elevate to root access by modifying cache pages of readable setuid-root binaries. Microsoft observed limited in-the-wild exploitation but warned of the vulnerability’s broad applicability across cloud, CI/CD, and Kubernetes environments.
The vulnerability enables privilege escalation through in-memory-only modifications, making detection difficult. Microsoft noted that successful exploitation “leads to full root privilege escalation and could facilitate container breakout, multi-tenant compromise, and lateral movement within shared environments.”
Android Debug Bridge Daemon Flaw Patched
Google released an Android security update on Monday addressing CVE-2026-0073, a critical remote code execution vulnerability in the Android Debug Bridge daemon (adbd). The flaw allows attackers to execute code as the shell user without requiring additional execution privileges or user interaction.
The vulnerability affects Android’s System component, specifically the background process that manages communication between Android devices and computers for debugging and shell access. Google’s advisory indicates no evidence of malicious exploitation, making it the second Android vulnerability flagged for in-the-wild attacks this year.
No patches were released this month for Wear OS, Pixel Watch, Android XR, and Android Automotive platforms. Google recently increased maximum bug bounty payouts to $1.5 million for zero-click Pixel Titan M exploits with persistence.
AI Tool Vulnerabilities Expose Supply Chain Risks
Two separate vulnerabilities in AI-powered tools highlight emerging attack vectors targeting development workflows. A critical flaw in Gemini CLI received a perfect 10/10 CVSS score for enabling supply chain attacks through indirect prompt injection.
Pillar Security researchers demonstrated how attackers could exploit Gemini CLI’s –yolo mode by hiding malicious prompts in GitHub issues. The vulnerability allowed automatic execution of any command, potentially leading to credential extraction and repository compromise across at least eight Google repositories using vulnerable workflow templates.
Separately, LayerX Security identified “ClaudeBleed” in the Claude Chrome extension, combining lax permissions with poor origin verification. The flaw allows any Chrome extension to issue commands to Claude, enabling remote prompt injection and AI agent takeover through DOM manipulation and forged user approvals.
Exploitation Patterns and Timeline Analysis
The recent vulnerability disclosures reveal concerning patterns in exploitation timelines and attacker behavior. CVE-2026-41940 demonstrates the challenge of zero-day detection, with exploitation occurring for months before vendor awareness. Censys scanning data showed multiple threat actors began attacking cPanel instances within 24 hours of public disclosure.
Copy Fail’s decade-long presence in Linux kernels highlights the persistence of privilege escalation vulnerabilities in critical infrastructure. The vulnerability’s stealth characteristics—requiring only in-memory modifications—explain its extended undetected lifespan across enterprise environments.
Google’s rapid patching of CVE-2026-0073 contrasts with the extended exposure periods seen in other vulnerabilities, suggesting improved detection capabilities in mobile security frameworks. The Android vulnerability’s lack of user interaction requirements makes it particularly concerning for remote exploitation scenarios.
What This Means
These vulnerabilities underscore three critical trends in modern cybersecurity. First, zero-day exploitation windows are narrowing for some vulnerabilities while extending for others, creating unpredictable risk profiles for organizations. The cPanel case shows how hosting infrastructure vulnerabilities can impact millions of websites simultaneously.
Second, AI-powered development tools introduce novel attack surfaces that traditional security controls don’t address. Supply chain attacks through AI agents represent a new category of risk requiring updated security frameworks and developer training.
Third, the combination of cloud infrastructure, containerization, and privilege escalation vulnerabilities creates compound risks. Copy Fail’s ability to enable container breakouts in multi-tenant environments demonstrates how single vulnerabilities can cascade across shared infrastructure.
Organizations should prioritize patch management for internet-facing services like cPanel, implement additional monitoring for privilege escalation attempts in containerized environments, and review AI tool permissions in development workflows.
FAQ
How can organizations detect if they’ve been affected by CVE-2026-41940?
cPanel users should check server logs for unusual administrative access patterns dating back to February 2026. KnownHost reported seeing exploitation attempts as early as February 23, so organizations should examine authentication logs for that timeframe and apply the April 28 security update immediately.
What makes Copy Fail particularly dangerous compared to other Linux vulnerabilities?
CVE-2026-31431 performs only in-memory modifications without writing to disk, making detection extremely difficult through traditional file integrity monitoring. Its reliability across different Linux distributions and ability to facilitate container breakouts make it especially dangerous in cloud environments.
Should organizations be concerned about AI tool vulnerabilities in development workflows?
Yes, both Gemini CLI and Claude extension vulnerabilities demonstrate how AI tools can become attack vectors for supply chain compromise. Organizations using AI-powered development tools should review permissions, implement additional validation for AI-generated actions, and monitor for unusual repository access patterns.
Related news
- cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now – The Hacker News
Sources
- Exploit Cyber-Frenzy Threatens Millions via Critical cPanel Vulnerability – Dark Reading
- Exploitation of ‘Copy Fail’ Linux Vulnerability Begins – SecurityWeek
- Critical Remote Code Execution Vulnerability Patched in Android – SecurityWeek
- Gemini CLI Vulnerability Could Have Led to Code Execution, Supply Chain Attack – SecurityWeek
- Vulnerability in Claude Extension for Chrome Exposes AI Agent to Takeover – SecurityWeek






