CURRENT STATUS: ✅ ALL SYSTEMS OPERATIONAL
INCIDENT HISTORY
2026-05-06 — Access to the demo version is limited until 2026-05-07
2026-05-05 — UPDATE: recovery completed
All client sites have been restored from backups and are now
running on new infrastructure. The server is protected by an
updated version of cPanel with CVE-2026-41940 patched.
Additional protection measures deployed after the incident:
- Automatic cPanel updates when security patches are released
- Enhanced monitoring for authentication bypass attempts
- Isolated backups outside the main infrastructure
- Regular security audits
Thank you for your patience during the recovery period.
2026-04-30 — Security incident on hosting server
WHAT HAPPENED
On April 30 our hosting server was compromised through a
vulnerability in cPanel (CVE-2026-41940 — authentication bypass
in WHM/cPanel). The vendor published details about the
vulnerability around the same time as the attack.
Attackers gained full access to the server, used it to attack
other systems on the network, and then wiped all data from
the server.
Sources:
- Technical analysis (watchTowr): https://labs.watchtowr.com/the-internet-is-falling-down-falling-down-falling-down-cpanel-whm-authentication-bypass-cve-2026-41940/
WHAT WE DID
- Isolated the compromised server from the network
- Deployed new infrastructure with patched cPanel
(fixed versions: 11.110.0.97, 11.118.0.63, 11.126.0.54,
11.132.0.29, 11.134.0.20, 11.136.0.5)
- Restored client sites from backups
- Strengthened infrastructure security (see block above)
QUESTIONS?
Ask our AI Advisor — it answers 90% of questions instantly:
about your site status, your data, what to do next. For
anything else it connects you to our team.
Just message us via the chat widget on the site.