cPanel Unscheduled TSR-2022-0004 Announcement

Not open for further replies.


Active Member
Staff member
Mar 2, 2022
Houston, TX
cPanel Access Level
Root Administrator
cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel & WHM product. These builds are currently available to all customers via the standard update system.

cPanel has rated this update as having a CVSSv3.1 score of 5.3.

Information on cPanel's security ratings is available at Security Levels | cPanel & WHM Documentation.

If your deployed cPanel & WHM servers are configured to automatically update when new releases are available, then no action is required. Your systems will update automatically. If you have disabled automatic updates, then we strongly encourage you to update your cPanel & WHM installations at your earliest convenience.


The following cPanel & WHM versions address all known vulnerabilities:

102.0.24 & Greater
106.0.9 & Greater
107.9999.94 & Greater
ea-nginx-1.23.1-9 & Greater

The latest public releases of cPanel & WHM for all update tiers are available at Downloads | cPanel, Inc..


There is no reason to believe that these vulnerabilities have been made known to the public. As such, cPanel will only release limited information about the vulnerabilities at this time.

Once sufficient time has passed, allowing cPanel & WHM systems to automatically update to the new versions, cPanel will release additional information about the nature of the security issue.

This Targeted Security Release addresses two vulnerabilities in cPanel & WHM software versions 102, 106, what will become 108 (development version 107 currently), and EasyApache4.

Additional information is scheduled for release the following day.

For information on cPanel & WHM Versions and the Release Process, read our documentation at: Product Versions and the Release Process | cPanel & WHM Documentation

For the PGP-signed message, please see TSR-2022-0004-Announcement.signed
Not open for further replies.