cPanel Flaw Exploited for Backdoors as Apache HTTP/2 and PAN-OS Zero-Days Collide

Attackers are exploiting a critical cPanel vulnerability to deploy persistent backdoors, while Apache HTTP/2, PAN-OS, and Linux kernel zero-days are actively being used in widespread espionage and supply chain attacks.

CSBadmin
2 Min Read

Threat actors are actively exploiting a critical cPanel vulnerability, tracked as [CVE-2026-41940](https://cve.org/CVERecord?id=CVE-2026-41940), to deploy a persistent backdoor within the Filemanager component of web hosting control panels. This server-side template injection flaw enables attackers to achieve remote code execution without authentication, allowing them to inject a malicious plugin that grants ongoing access. cPanel has released patches, and administrators are urged to update immediately, especially since the flaw is being leveraged in widespread attacks.

Critical Infrastructure and AI-Targeted Threats

In parallel, a critical Apache HTTP/2 vulnerability, [CVE-2026-23918](https://cve.org/CVERecord?id=CVE-2026-23918), allows unauthenticated attackers to trigger denial of service and potentially achieve remote code execution through specially crafted HTTP/2 requests. Meanwhile, a actively exploited Palo Alto Networks PAN-OS flaw is granting attackers root access for espionage, with the same vulnerability being used to drop backdoors on unpatched firewalls. The Linux ecosystem is also under fire from the “Dirty Frag” local privilege escalation exploit, which enables root access across major distributions via a flaw in the kernel’s network fragment handling, alongside a new backdoor called PamDOORa that compromises PAM modules to steal SSH credentials.

Novel Attack Techniques and Supply Chain Risks

Attackers have deployed AI to develop the first known zero-day exploit targeting two-factor authentication, allowing mass account takeovers without alerting users. In the software supply chain, the TeamPCP group has compromised the Checkmarx Jenkins AST plugin, just weeks after a similar attack on the KICS plugin, aiming to inject malicious code into CI/CD pipelines. A new Linux remote access trojan, Quasar Linux RAT, is specifically targeting developer credentials to enable software supply chain compromises, while the TCLBANKER banking trojan uses self-propagating worms through WhatsApp and Outlook to steal financial credentials. A fake OpenAI privacy filter repository on Hugging Face reached the number one trending spot and accumulated over 244,000 downloads before being taken down, highlighting the risks in AI model marketplaces.

Source: The Hacker News

CSBadmin

The latest in cybersecurity news and updates.

Share This Article
Follow:
The latest in cybersecurity news and updates.