PatchSiren cyber security CVE debrief
CVE-2026-32992 cPanel CVE debrief
cPanel published a security update on 2026-05-13 for CVE-2026-32992. The vendor says SSL verification was not fully enforced in the DNS Cluster system, which could let a malicious server man-in-the-middle a request and capture credentials. cPanel released fixes in specific cPanel & WHM branches and in WP Squared, and states that later versions are also patched.
- Vendor
- cPanel
- Product
- cPanel/WHM
- CVSS
- Unknown
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-13
- Original CVE updated
- 2026-05-13
- Advisory published
- 2026-05-13
- Advisory updated
- 2026-05-13
Who should care
cPanel & WHM and WP Squared administrators, especially teams using DNS Cluster functionality or managing multi-server cPanel environments where cluster traffic could expose credentials if intercepted.
Technical summary
According to the vendor advisory, the flaw is an SSL verification enforcement issue in the DNS Cluster system. If an attacker can position a malicious server in the request path or otherwise impersonate a cluster endpoint, the weak verification could allow interception of cluster communications and credential capture. cPanel lists fixed releases for cPanel & WHM 11.126.0.59+, 11.130.0.23+, 11.132.0.32+, 11.134.0.26+, 11.136.0.10+, and WP Squared 11.136.1.12+.
Defensive priority
High
Recommended defensive actions
- Update cPanel & WHM or WP Squared to a fixed release listed by the vendor as soon as possible.
- Verify the installed version after updating to confirm the patch was applied successfully.
- If you operate DNS Cluster functionality, review the trust and endpoint configuration for unexpected changes or unrecognized servers.
- If you have reason to suspect cluster traffic may have been intercepted, review related credentials and consider rotating them following your incident-response procedures.
Evidence notes
Vendor advisory published 2026-05-13 12:44:00Z and modified 2026-05-13 20:16:48Z. cPanel states that SSL verification was not fully enforced in the DNS Cluster system and that a malicious server could man-in-the-middle requests and capture credentials. The advisory names fixed versions: cPanel & WHM 11.126.0.59+, 11.130.0.23+, 11.132.0.32+, 11.134.0.26+, 11.136.0.10+, and WP Squared 11.136.1.12+. No CVSS score was supplied in the source corpus.
Official resources
-
CVE-2026-32992 CVE record
CVE.org
-
CVE-2026-32992 NVD detail
NVD
-
Vendor advisory source
cpanel_changelog_rss
Vendor-disclosed security issue published by cPanel on 2026-05-13; the source item was modified the same day.