PT-2026-38674 · Cpanel · Whm+1
David Hertenstein
·
Published
2026-05-08
·
Updated
2026-05-10
·
CVE-2026-29202
CVSS v3.1
8.8
High
| Vector | AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
cPanel versions prior to 11.136.0.9
cPanel versions prior to 11.136.1.10 (WP Squared)
cPanel versions prior to 11.134.0.25
cPanel versions prior to 11.132.0.31
cPanel versions prior to 11.130.0.22
cPanel versions prior to 11.126.0.58
cPanel versions prior to 11.124.0.37
cPanel versions prior to 11.118.0.66
cPanel versions prior to 11.110.0.117
cPanel versions prior to 11.110.0.116 (cl6110)
cPanel versions prior to 11.102.0.41
cPanel versions prior to 11.94.0.30
cPanel versions prior to 11.86.0.43
Description
Insufficient input validation of the
plugin parameter within the create user plugin enables arbitrary Perl code execution. This action is performed on behalf of the system user of the already authenticated account.Recommendations
Update to version 11.136.0.9 or higher.
Update to version 11.136.1.10 or higher (WP Squared).
Update to version 11.134.0.25 or higher.
Update to version 11.132.0.31 or higher.
Update to version 11.130.0.22 or higher.
Update to version 11.126.0.58 or higher.
Update to version 11.124.0.37 or higher.
Update to version 11.118.0.66 or higher.
Update to version 11.110.0.117 or higher.
Update to version 11.110.0.116 or higher (cl6110).
Update to version 11.102.0.41 or higher.
Update to version 11.94.0.30 or higher.
Update to version 11.86.0.43 or higher.
Restrict access to WHM management ports 2086 and 2087 to trusted IP addresses.
Disable the WHM Terminal UI feature by running
touch /var/cpanel/disable whm terminal ui.Fix
DoS
LPE
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Whm
Cpanel