Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Filemanager Backdoor Epidemic: Unpacking the cPanel Vulnerability CVE-2026-41940



A new wave of cyberattacks has exploited a critical cPanel vulnerability (CVE-2026-41940), deploying the Filemanager backdoor and placing sensitive data at risk. With thousands of instances exposed, experts are racing against time to develop tools and share knowledge to mitigate this emerging threat.

  • The newly discovered CVE-2026-41940 vulnerability in cPanel has been exploited by cybercriminals to deploy backdoors, steal sensitive data, and wreak havoc on unsuspecting victims.
  • The vulnerability was first disclosed in April 2022 by watchTowr, a cybersecurity firm, and attackers have been actively exploiting it for weeks.
  • The Filemanager malware uses authentication manipulation to gain unauthorized access to infected systems, allowing attackers to manipulate hosting settings or take control of entire servers.
  • Researchers discovered a Go-based malware dubbed "Payload" that embeds malicious code into compromised cPanel systems, steals login credentials, and deploys a remote-control trojan named Filemanager.
  • The malware's versatility across Linux, Windows, and macOS platforms highlights the ongoing threat landscape of advanced persistent threats (APTs).
  • The attackers used XOR string obfuscation to hide malicious code within a legitimate WordPress file, attempting to evade detection and security tools.
  • The connection between the malware and the Mr_Rot13 threat group underscores the need for continuous vigilance among cybersecurity professionals.
  • Thousands of servers have been exposed due to the exploitation of CVE-2026-41940, placing sensitive data at risk, with attackers using Telegram bots as a backup channel.



  • The cybersecurity landscape has been ravaged by a new wave of malicious attacks, all hinging on the exploitation of a single vulnerability in the widely used web hosting control panel, cPanel. The flaw, designated as CVE-2026-41940, has proven to be a boon for cybercriminals seeking to deploy backdoors, steal sensitive data, and wreak havoc on unsuspecting victims. This article aims to delve into the intricacies of this vulnerability, explore its implications, and outline the measures being taken to mitigate the damage.

    The discovery of CVE-2026-41940 is attributed to watchTowr, a cybersecurity firm that first disclosed the flaw in April 2022. It was soon revealed that attackers had been actively exploiting this vulnerability for weeks, using it to deploy the Filemanager backdoor and gain unauthorized access to compromised servers. This marked the beginning of an epidemic-like scenario, with thousands of instances exposed across various platforms.

    Filemanager is a malicious tool designed to provide remote control over infected systems, allowing attackers to manipulate and exploit vulnerable configurations to their advantage. The malware operates by manipulating authentication checks, rendering traditional login protocols ineffective against its attacks. This exploitation enables attackers to access sensitive data, manage hosting settings, or even take control of entire servers.

    Researchers from QiAnXin XLab have been instrumental in unraveling the mysteries surrounding this vulnerability. In a recent report published on May 4, they discovered a Go-based malware dubbed "Payload." Embedded with Turkish-language log messages that appeared to be AI-generated, Payload embeds an SSH public key, malicious PHP and JavaScript code into compromised cPanel systems. It steals login credentials, sends stolen information back to Telegram-controlled channels, and deploys a remote-control trojan named Filemanager.

    The malware's functionality is particularly noteworthy due to its versatility across Linux, Windows, and macOS platforms. This indicates that the attackers have designed Payload with persistence in mind – a hallmark of advanced persistent threats (APTs). The presence of this malware highlights the ongoing threat landscape, where APTs continue to pose significant challenges for cybersecurity professionals.

    Furthermore, researchers observed that the malware hid malicious code within a legitimate WordPress file using XOR string obfuscation. This tactic employed by the attackers is indicative of an effort to avoid detection and evade security tools. The communication with attacker-controlled servers points to an intricate infrastructure, hinting at a long-running threat actor or group operating covertly since at least 2020.

    A thorough examination of the malicious script revealed that it was linked to the Mr_Rot13 threat group, which had previously been active in various cybersecurity incidents dating back several years. This connection highlights the continuity and sophistication of APT operations, underscoring the need for continuous vigilance among cybersecurity professionals.

    The implications of this vulnerability are far-reaching. Thousands of servers have been exposed due to the exploitation of CVE-2026-41940, placing sensitive data at risk. With attackers actively using Telegram bots as a backup channel to receive stolen information, the potential for catastrophic breaches is substantial.

    In response to this growing threat, cybersecurity experts and researchers have come together to share knowledge and develop tools to identify vulnerable hosts and mitigate the impact of this vulnerability. The release of detection artifacts by watchTowr marks an important step in safeguarding against this emerging threat.

    As we move forward in addressing the Filemanager backdoor epidemic, it is essential that we recognize the interplay between technology advancements, human fallibility, and the continuous evolution of cyber threats. As we develop new defenses to counter CVE-2026-41940, we must also acknowledge the need for greater awareness among users about cybersecurity best practices.

    Ultimately, this serves as a stark reminder of the importance of ongoing vigilance in our quest to protect against emerging threats like Filemanager backdoor and the continuous vulnerability CVE-2026-41940. As cybersecurity experts, it is imperative that we recognize these challenges and work collaboratively to mitigate their impact on the global cybersecurity ecosystem.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/The-Filemanager-Backdoor-Epidemic-Unpacking-the-cPanel-Vulnerability-CVE-2026-41940-ehn.shtml

  • https://securityaffairs.com/192013/cyber-crime/attackers-exploit-cpanel-cve-2026-41940-to-deploy-filemanager-backdoor.html


  • Published: Tue May 12 08:19:49 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us