Liquid Web incident

Critical Authentication Vulnerability on cPanel/WHM

Critical Ongoing View vendor source →
Started
Apr 28, 2026, 09:57 PM UTC
Resolved
Ongoing
Duration
● 5d 4h
Detected by Pingoru
Apr 28, 2026, 09:57 PM UTC

Affected components

CPanel

Update timeline

  1. investigating Apr 28, 2026, 06:45 PM UTC

    We are actively responding to a critical vulnerability affecting all versions of cPanel & WHM. This vulnerability impacts the authentication process and could allow unauthorized access if left unmitigated. More information from cPanel is available here: https://support.cpanel.net/hc/en-us/articles/40073787579671-Critical-Vulnerability-with-cPanel-WHM-Login-Authentication Our team is working alongside vendor guidance and implementing proactive safeguards to protect environments. As an immediate precaution, we have temporarily restricted access to cPanel/WHM interfaces on the following ports 2082, 2083, 2086, and 2087. Restricted access will remain in place until a patch is developed and deployed. This action is being taken to prevent potential unauthorized access while a permanent fix is finalized. Impact: -Restricting access to cPanel/WHM Ports via a network firewall block. During this time customers will not be able to login to either WHM or cPanel unless they use a Cloud VPN Connection. -No impact to hosted websites, applications, email or services. We are closely monitoring the official patch release from cPanel and will deploy it as quickly as possible. Once mitigations are no longer required, normal access will be restored. Until a patch is released by cPanel customers will need to utilize a Cloud VPN connection to access WHM or cPanel, or reach out to support via live chat or ticket for assistance WHM or cPanel assistance. Instructions on how to create a Cloud VPN user can be found here: https://www.liquidweb.com/help-docs/portal/account/account-security/setting-up-your-cloud-vpn/ If you require access to cPanel and WHM please feel free to reach out to us via chat or open up a support ticket with your request and we will be happy to assist you. No additional action is required at this time. We will provide additional updates to this status page as more information is made available.

  2. investigating Apr 28, 2026, 08:12 PM UTC

    A brief configuration issue in our Ashburn (NTT) data center caused an un-intended disruption to outbound network traffic. Customers with servers in this location may have experienced intermittent connectivity or downtime lasting approximately 10 minutes. Our team quickly identified and corrected the issue. All services have since been restored and are functioning normally. We continue to restrict access to cPanel/WHM interfaces on ports 2082, 2083, 2086, and 2087 across our data centers until a patch is released by cPanel. If you need assistance with any cPanel/WHM items please reach out to support through live chat or a ticket. We will provide additional updates to this status page as more information is made available.

  3. investigating Apr 28, 2026, 09:13 PM UTC

    cPanel has disclosed that the additional cPanel-provided services Webmail and Web Disk are impacted by this vulnerability. Out of an abundance of caution, and based on cPanel’s current recommendation, we are implementing temporary protective changes on servers hosted on our network. Temporary changes being implemented: -Blocking access to ports related to cPanel services: WHM: 2082 / 2083 cPanel: 2086 / 2087 Webmail: 2096 / 2097 Web Disk: 2077 / 2078 -Temporarily disabling cpsrvd, which is the web wrapper for cPanel web services.As a result, cPanel, WHM, Webmail, Web Disk, and related cPanel services will be inaccessible, including over Cloud VPN connections. These changes do not impact websites, email delivery, databases, or Apache functionality. Customers who normally access email through Webmail can still access email by using a mail client. Setup instructions are available here: https://www.liquidweb.com/help-docs/email/mail-clients/setup-an-email-client/ These temporary restrictions will be reverted as soon as cPanel releases a patch addressing the critical vulnerabilities. Additional information from cPanel is available here: https://support.cpanel.net/hc/en-us/articles/40073787579671-Critical-Vulnerability-with-cPanel-WHM-Login-Authentication If you have further questions or need assistance, please contact our Support team.

  4. identified Apr 28, 2026, 09:57 PM UTC

    Update: cPanel Patch Deployment Underway cPanel has released a patch to address the authentication vulnerability that was identified today. Our engineers are currently working on deploying this patch across eligible cPanel services. Once the patch is successfully applied, we will take the following actions: Remove the network-level firewall blocks. WHM: 2082 / 2083 cPanel: 2086 / 2087 Webmail: 2096 / 2097 Web Disk: 2077 / 2078 Re-enable the cPanel web service (cpsrvd). More information from cPanel is available here: https://support.cpanel.net/hc/en-us/articles/40073787579671-Critical-Vulnerability-with-cPanel-WHM-Login-Authentication We appreciate your continued patience as we complete these actions to restore full service. If you have any questions in the meantime, please contact us for assistance.

  5. identified Apr 29, 2026, 05:32 AM UTC

    Update: cPanel patch implemented. We have deployed cPanel’s latest patch across eligible servers. cPanel versions: TIER 11.110 WAS: 11.110.0.96 NOW: 11.110.0.97 TIER 11.118 WAS: 11.118.0.61 NOW: 11.118.0.63 TIER 11.126 WAS: 11.126.0.53 NOW: 11.126.0.54 TIER 11.132 WAS: 11.132.0.27 NOW: 11.132.0.29 TIER 11.134 WAS: 11.134.0.19 NOW: 11.134.0.20 TIER 11.136 WAS: 11.136.0.4. NOW: 11.136.0.5 We are currently evaluating servers that failed to update (or had pre-existing update blockers), and we will be sending further updates as soon as more information is available. Network-level firewall blocks for cPanel, WHM, webmail, and webdisk ports remain in place at this time. We appreciate your continued patience as we complete these actions to restore full service. If you have any questions in the meantime, please contact us for assistance.

  6. identified Apr 29, 2026, 01:08 PM UTC

    The cPanel patch remains deployed across eligible systems, and network-level firewall restrictions for cPanel, WHM, webmail, and web disk ports are still in place at this time. Our team is reconvening this morning to review overall progress, evaluate any remaining update exceptions, and determine the appropriate timing for safely removing these access restrictions. We will provide additional updates as soon as more information becomes available. We appreciate your continued patience as we work toward restoring full access. If you have any issues in the meantime, please contact our support team for assistance.

  7. identified Apr 29, 2026, 04:44 PM UTC

    cPanel patches have been deployed across all eligible servers. As mitigation measures are now in place for the majority of systems, we have lifted the temporary network-level blocks that were implemented to prevent unauthorized access. For servers ineligible for the patch, we are applying temporary protections at the server level using CSF. As part of this step, CSF rules are being implemented to restrict access to the affected ports. This approach allows access to be controlled by whitelisting trusted client IP addresses while maintaining appropriate security protections. We strongly recommend that all customers update to the latest version of cPanel & WHM as soon as possible to ensure full protection against this vulnerability. For servers not eligible for the patch, we will be reaching out shortly with guidance on what options are available to secure your environment. We will continue to closely monitor the situation and take any additional steps necessary to maintain system security and stability. If you need assistance with updating cPanel or have any concerns, please contact our Support team.

  8. identified Apr 29, 2026, 10:15 PM UTC

    cPanel patches have been deployed across all eligible servers. For a subset of systems running versions that cannot be updated, additional security protections are being implemented to allow continued access to cPanel services while maintaining necessary safeguards. To ensure ongoing protection, cPanel service ports will remain restricted on these systems. Customers who prefer to fully restore standard access will need to update to a supported version of cPanel. Our team will be reaching out with guidance on available options. If you have questions or need assistance, please contact Support.

  9. identified May 03, 2026, 09:04 PM UTC

    Support chat is temporarily unavailable while our support team focuses on responding to the backlog of tickets related to the recent cPanel vulnerability. Our teams are working as quickly as possible to review and respond to open tickets. If you already have a ticket open, please avoid submitting duplicate tickets, as this can increase overall support volume and slow our ability to respond to impacted customers. cPanel security patches have been deployed across eligible servers, and network restrictions have been removed. For servers not eligible for the patch, additional protections are in place that may limit access to certain cPanel services. Thank you for your patience while we continue working through these requests.

Looking to track Liquid Web downtime and outages?

Pingoru polls Liquid Web's status page every 5 minutes and alerts you the moment it reports an issue — before your customers do.

  • Real-time alerts when Liquid Web reports an incident
  • Email, Slack, Discord, Microsoft Teams, and webhook notifications
  • Track Liquid Web alongside 5,000+ providers in one dashboard
  • Component-level filtering
  • Notification groups + maintenance calendar
Start monitoring Liquid Web for free

5 free monitors · No credit card required