Update - Updates are now available for these build:

11.110.0.97
11.118.0.63
11.126.0.54
11.132.0.29
11.136.0.5
11.134.0.20
WP Squared 11.136.1.7

Please run the following command to retrieve the patched version.

/scripts/upcp --force

You can confirm you are on a patched version of cPanel with the following command:

/usr/local/cpanel/cpanel -V

As long as the output matches one of the above versions, then your system has been patched.

Warning: If your server is not running a supported version of cPanel that is eligible for this update, it is recommended to firewall off port 2078-2096 and migrate to a supported version of cpanel/WHM.

Apr 29, 2026 - 12:07 EDT
Identified - Updates are available:
TIER 11.110 WAS: 11.110.0.96 NOW: 11.110.0.97
TIER 11.118 WAS: 11.118.0.61 NOW: 11.118.0.63
TIER 11.126 WAS: 11.126.0.53 NOW: 11.126.0.54
TIER 11.132 WAS: 11.132.0.27 NOW: 11.132.0.29
TIER 11.134 WAS: 11.134.0.19 NOW: 11.134.0.20
TIER 11.136 WAS: 11.136.0.4. NOW: 11.136.0.5

Please run the following command to retrieve the patched version.

/scripts/upcp

* Webhosting Systems are being updated in stages, as they update cpanel services will be re-enabled.

Users running older systems that are not supported by cpanel/WHM must firewall off the ports.

Apr 28, 2026 - 19:36 EDT
Investigating - All cpanel/WHM VPS and Server owners please review: https://support.cpanel.net/hc/en-us/articles/40073787579671-Critical-Vulnerability-with-cPanel-WHM-Login-Authentication

At minumum

Disable cpdavd

whmapi1 configureservice service=cpdavd enabled=0 monitored=0

Then stop cpsrvd on your server:

/scripts/restartsrv_cpsrvd --stop


Please be aware cpanel/WHM services will be offline until a patch is released.

Apr 28, 2026 - 16:45 EDT

About This Site

Interserver Status Page

my Operational
Management Portal Operational
Datacenters Operational
TEB2 Operational
TEB4 Operational
TEB5 Operational
TEB6 Operational
Equinix NY4 Operational
Equinix LAX1 Operational
LAX2 Operational
TEB7 Operational
Network Operational
Network Operational
Services Operational
Webhosting Operational
Storage Operational
VPS Operational
Mailbaby Operational
Scrub Operational
Operational
Degraded Performance
Partial Outage
Major Outage
Maintenance
Apr 29, 2026

Unresolved incident: Critical Vulnerability with cPanel & WHM Login Authentication.

Apr 28, 2026
Apr 27, 2026

No incidents reported.

Apr 26, 2026

No incidents reported.

Apr 25, 2026

No incidents reported.

Apr 24, 2026

No incidents reported.

Apr 23, 2026

No incidents reported.

Apr 22, 2026

No incidents reported.

Apr 21, 2026

No incidents reported.

Apr 20, 2026

No incidents reported.

Apr 19, 2026
Resolved - The system has been stable since the hardware replacement.
Apr 19, 12:53 EDT
Investigating - The webhosting2022 system will be moved into a new server chassis replacing the motherbard and other components to further address the cause of the outage last night.
Apr 18, 16:34 EDT
Apr 18, 2026
Apr 17, 2026

No incidents reported.

Apr 16, 2026

No incidents reported.

Apr 15, 2026
Resolved - This incident has been resolved.
Apr 15, 16:13 EDT
Identified - We are extending the maintance window for kvm345
Apr 15, 16:03 EDT
Completed - The scheduled maintenance has been completed.
Apr 15, 16:00 EDT
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Apr 15, 15:00 EDT
Scheduled - Upgrade Path: Ubuntu 22.04 LTS → Ubuntu 24.04 LTS
Summary of Work

To ensure the continued security and performance of our virtualization infrastructure, we are upgrading the KVM345 hostnode to the latest Long Term Support (LTS) version. This maintenance brings critical updates to the Linux Kernel (5.15→6.8), QEMU, and Libvirt, providing better memory management and system stability.
Impact on Virtual Machines

During this maintenance window, the hostnode will require a full system reboot to initialize the new kernel and virtualization stack.

State Saving: Before the final restart, we will attempt to "Save to Disk" (Suspend) all running Virtual Machines. This captures the current RAM state so the VM does not have to perform a cold boot.

Resuming: Once the hostnode is back online, we will automatically attempt to resume all saved VMs.

Potential Downtime: Clients should expect a temporary loss of connectivity for the duration of the host reboot (approximately 10–15 minutes).

Expected Timeline

Preparation: Final backups of host configurations in progress today. This will not affect any systems.

OS Upgrade: In-place upgrade of system packages started tomorrow.

Final Reboot: VMs are saved, the host restarts, and VMs are resumed.

The total time for the upgrade is expected to take 1 hour, the shutdown, resume and reboot time is expected to take less than 15 minutes.

Apr 14, 14:19 EDT