May 15, 2026 — Webzi Operations Team
The past three weeks have been, without exaggeration, the most active period for critical web infrastructure vulnerabilities we have recorded in recent years. In this article we want to be completely transparent about what happened, how we responded, and what you can do to strengthen the security of your services.
The landscape: four kernel exploits and nine cPanel vulnerabilities in under three weeks
Between April 28 and May 15, 2026, the hosting ecosystem was hit by an unusually dense series of critical disclosures. This was not an isolated incident — it was multiple simultaneous fronts that required an immediate response on every server.
Linux kernel vulnerabilities
| Date | CVE / Name | Severity | Summary |
|---|---|---|---|
| April 29 | CVE-2026-31431 “Copy Fail” | CVSS 7.8 | Local privilege escalation to root. Functional exploit in 732 bytes. Affected every kernel since 2017. |
| May 7 | CVE-2026-43284 “Dirty Frag” | CVSS 7.8 | Privilege escalation via the kernel’s IPsec/ESP subsystem. |
| May 13 | CVE-2026-46300 “Fragnesia” | CVSS 7.8 | Second variant in the same IPsec/ESP subsystem. Chainable with Dirty Frag. |
| May 15 | CVE-2026-46333 “ssh-keysign-pwn” | Public PoC | Kernel race condition: unprivileged users can read the server’s SSH private keys and the system password database. |
cPanel / WHM vulnerabilities
| Patch date | CVEs | Max severity | Impact |
|---|---|---|---|
| April 28 | CVE-2026-41940 | CVSS 9.8 — Critical | Authentication bypass without credentials. Exploited as a zero-day months before a patch existed. 44,000+ servers compromised globally. |
| May 8 | CVE-2026-29201, 29202, 29203 | CVSS 8.8 — High | Perl code injection, arbitrary file read, privilege escalation via symlink manipulation. |
| May 13 | CVE-2026-29205, 29206, 32991, 32992, 32993 | High | Fifth emergency patch round from cPanel in less than three weeks. |
To put this in perspective: we normally see this volume of critical CVEs spread across several months. Seeing them concentrated into 17 days is extraordinary.
What we did on every server
For each vulnerability, our operations team acted on the same day as the disclosure — no waiting for scheduled maintenance windows. Actions taken across all shared hosting and reseller infrastructure include:
- Reboot-free kernel mitigations: For all four kernel CVEs we applied sysctl controls (
kernel.user_ptrace=0on CloudLinux servers andkernel.yama.ptrace_scope=3on standard Linux) that block the attack vector immediately and persistently. - KernelCare active: On servers running KernelCare, livepatches are applied automatically as CloudLinux publishes them, with zero service interruption.
- cPanel patches applied same-day: Every cPanel/WHM security patch was applied within the first hours of availability in each release cycle.
- Imunify360 and WAF rules updated: ModSecurity and Proactive Defense rules are kept current to detect known exploitation patterns for these CVEs.
- Kernel modules blacklisted: For Dirty Frag and Fragnesia, module blacklists (
esp4,esp6,rxrpc) were applied as an additional containment measure.
Note for self-managed VPS and dedicated server customers: If you manage your own server, please verify that your kernel and cPanel patches are up to date. If you need assistance, open a support ticket and our team will help.
Security recommendations for your sites and accounts
Server-level security is only one layer. Here are concrete actions you can take today to reduce your exposure:
1. Enable two-factor authentication (2FA) in cPanel
CVE-2026-41940 showed that even 2FA can be bypassed on an unpatched server. On fully patched servers, 2FA remains an effective and essential barrier. You can enable it from your cPanel under Security → Two-Factor Authentication.
2. Keep your CMS, plugins, and themes updated
WordPress, Joomla, and Drupal are the most common attack vectors in shared hosting environments. An outdated plugin can compromise your entire account regardless of how well-protected the server is. Check for pending updates at least once a week.
3. Use unique, strong passwords for every service
A password compromised on any other platform can be reused to access your cPanel. Use a password manager (Bitwarden, 1Password, or similar) and make sure no password is shared between services.
4. Verify that your backups are active and restorable
Backups are your last line of defense against ransomware and serious compromises. Confirm from your cPanel (Files → JetBackup) that automatic backups are running and that you can actually restore from them. A backup that has never been tested is not a reliable backup.
5. Remove access credentials you no longer use
Review and remove FTP accounts, cPanel sub-accounts, and email accounts that are no longer active. Every live credential is an attack surface. You can manage them under Files → FTP Accounts and Email → Email Accounts.
6. Periodically review your site files
Imunify360 scans automatically for malware, but an occasional manual check of critical files (wp-config.php, .htaccess, index.php) can catch unauthorized modifications early. If you find anything suspicious, open a support ticket immediately.
7. For VPS and dedicated servers: keep the kernel updated
This week, every unpatched hour was a real risk window. If you manage your own server, run dnf update kernel regularly and consider installing KernelCare to apply kernel patches without reboots. Contact our team if you need guidance.
Conclusion
May 2026 is a stark reminder that web infrastructure security is not a one-time setup — it is a continuous process. The speed at which critical vulnerabilities are being disclosed this month —with public exploits available within hours of disclosure— demands immediate action from hosting providers.
Our team will continue monitoring the situation and applying patches and mitigations as soon as they become available. If you have questions about the security status of your account or need help with any of the recommendations above, we are available through our support ticket system.
The Operations Team — Webzi / ArteHosting
Related Articles
🔧 ConfigServer Shutting Down: Free Permanent Download of All Tools Available at Webzi
Free download CSF Firewall and ConfigServer tools: CMM, CMQ, CMC, CSE. Direct links without registration. Permanent mirrors hosted at Webzi.
POP3 vs. IMAP: Which is the Best Choice for Email Synchronization?
Discover How to Set Up Your Custom Domain Email and Learn the Differences Between POP3 and IMAP Protocols for Improved Synchronization.
Making Presentations in PowerPoint or Keynote: A New Approach with AI
Create Power Point slides using AI
We Launched HTTP/2 by Default for All Websites on Webzi⚡️
We’ve upgraded Webzi hosting to HTTP/2 for faster website loading, improved performance, and better SEO. No action needed—your site is now more efficient and secure by default! Learn more about the benefits of HTTP/2 and how it enhances your website’s speed and reliability.
