A new disclosed cPanel flaw tracked as CVE-2026-41940 is being mass-exploited to breach websites and encrypt data in “Sorry” ransomware attacks.
This week, an emergency update for WHM and cPanel was released to fix a critical authentication bypass flaw that allows attackers to access control panels.
WHM and cPanel are Linux-based web hosting control panels for server and website management. While WHM provides server-level control, cPanel provides administrator access to the website backend, webmail, and databases.
Internet security watchdog Shadowserver now reports that at least 44,000 IP addresses running cPanel have since been compromised in ongoing attacks.
cPanel flaw exploited for Sorry ransomware attacks
Numerous sources told BleepingComputer that hackers have been exploiting the cPanel flaw since Thursday to breach servers and deploy a Go-based Linux encryptor for the “Sorry” ransomware [VirusTotal].
There have been numerous reports of websites impacted by the attacks, including on the BleepingComputer forums, where a victim shared samples of the encrypted files and the contents of the ransom note.
Since then, widespread exploitation and ransomware attacks have been spotted, with hundreds of compromised sites already indexed in Google.
Advertisement
Google listing of websites hit in Sorry ransomware attacks Source: BleepingComputer
The Sorry ransomware encryptor is designed specifically for Linux and will append the “.sorry” extension to all encrypted files.
Files encrypted by the Sorry ransomware Source: diozada on the BleepingComputer forums
BleepingComputer was told that the ransomware uses the ChaCha20 stream cipher to encrypt files, with the encryption key protected using an embedded RSA-2048 public key.
Ransomware expert Rivitna says the only way to decrypt these files is to obtain the corresponding private RSA-2048 key.
In each folder, a ransom note named README.md is created, instructing the victim to contact the threat actor on Tox to negotiate a ransom payment.
The ransom note is the same for each victim of this ransomware campaign, including the Tox ID “3D7889AEC00F2325E1A3FBC0ACA4E521670497F11E47FDE13EADE8FED3144B5EB56D6B198724,” which is used to contact the threat actor.
It should be noted that a 2018 ransomware campaign utilized a HiddenTear encryptor to encrypt files and append the .sorry extension. This current campaign uses a different encryptor and is unrelated.
All cPanel and WHM users are urged to immediately install the available security updates to protect their websites from ransomware attacks and data theft.
The attacks have just started, and we will likely see increased exploitation over the coming days and weeks.
AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.
At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.
You must be logged in to post a comment Login