What is the CRLF vulnerability in cPanel?
CRLF (Carriage Return Line Feed) injection in cPanel/WHM allows an attacker to insert encoded %0D%0A characters in HTTP parameters, mainly in the /login/?user= endpoint. This enables response header manipulation, reflected XSS attacks, web cache poisoning, and administrative session hijacking. Also known as HTTP Response Splitting.
How do I know if my cPanel server is vulnerable to CRLF?
Use this free scanner: enter your cPanel server URL (port 2083) or WHM (port 2087) and click Scan. The test injects an innocuous control header X-Vulnerable-Test:YES. If the server reflects it in its HTTP response, it is vulnerable to CRLF injection and must be patched immediately.
Does the CRLF test damage my cPanel server?
No. The test is completely non-destructive: it only injects a test HTTP header to verify if the server processes it improperly. It does not modify configurations, create files, consume significant resources, or require authentication. It is equivalent to a normal HTTP request with a special parameter.
Which versions of cPanel and WHM are affected?
The vulnerability affects versions of cPanel/WHM that have not received the corresponding security patch. Check your version with /usr/local/cpanel/cpanel -V from SSH and consult the official cPanel changelog to confirm if your build includes the CRLF injection fix. LTS tier builds without updates are most exposed.
How do I patch the CRLF vulnerability in cPanel?
The fastest way is to update cPanel/WHM to the latest version by running /scripts/upcp --force from SSH as root. As temporary mitigation, you can add ModSecurity rules that block %0D%0A sequences in URIs and arguments. This tool automatically generates a complete remediation plan with copyable commands when it detects vulnerability.
Does the scanner work with WHM as well as cPanel?
Yes. WHM typically runs on port 2087 (SSL) or 2086 (non-SSL), while cPanel uses 2083 (SSL) or 2082 (non-SSL). Enter the URL including the port, for example https://your-server.com:2087. The CRLF test applies to the underlying login module (cpsrvd) shared by cPanel and WHM.
Is it legal to use this scanner against other servers?
No. In most jurisdictions (Computer Fraud and Abuse Act in the US, Budapest Convention in Europe, local cybercrime laws) testing systems without explicit owner authorization is illegal and may carry prison sentences. This tool requires authorization confirmation before running the test and is designed solely for auditing your own servers.
Are my tests logged anywhere?
The tool does not store tested URLs in databases. Rate limiting uses only temporary PHP sessions. However, the target server does log the request in its own access logs (/usr/local/apache/logs/access_log), like any normal HTTP request. This is expected in a legitimate audit.
Does this scanner detect CVE-2026-41940?
Yes. CVE-2026-41940 is a pre-authentication CRLF injection in cPanel & WHM's cpsrvd session handler — the exact same vulnerability class this scanner tests. If the scanner reports your server as vulnerable, you are almost certainly exposed to CVE-2026-41940 (CVSS 9.8). Patch immediately with /scripts/upcp --force or block ports 2083/2087/2095/2096 at the firewall.
How do I know if I'm already compromised by the nuclear.x86 botnet?
The nuclear.x86 Mirai variant actively kills cleanup commands like wget and curl to prevent removal. Run wget google.com from an SSH session: if it returns Killed instead of downloading, the botnet is active on your server. Other IoCs: check /var/cpanel/sessions/raw/ for files containing user=root, hasroot=1, tfa_verified=1, or successful_internal_auth_with_timestamp from before you patched.
My server is compromised — what should I do?
Assume full root compromise. The attacker has /etc/shadow contents, may have created admin accounts, modified ~/.ssh/authorized_keys, dropped cron jobs, or installed cryptominers. Step 1: isolate the server (block public IPs at firewall). Step 2: kill nuclear.x86 processes (pkill -9 -f nuclear.x86). Step 3: rotate ALL credentials (root, cPanel users, MySQL, FTP, SSH keys, API tokens). Step 4: audit /etc/passwd, /etc/sudoers.d/, ~/.ssh/authorized_keys, cron jobs, WHM users. Safest path: rebuild from a clean backup taken before the compromise window (potentially as early as Feb 23, 2026).