We've now resolved the incident. Thanks for your patience. We apologise for the extremem measures we took, however without further knowledge on how severe the exploits were, and with other exploits recently discovered that were quite critical, we chose to take the extreme method for the safety of our customers and their data. cPanel have released patches for the 3 CVEs and we have successfully applied them to the fleet.
If you have a SMVPS, we highly recommend you update your cPanel installations immediately, as we have removed out firewall blocks to restore service to our fleet.
We have been alerted to 3 critical cPanel vulnerabilities that could allow a malicious user to gain elevated privileges to our hosting infrastructure:
CVE-2026-29201 CVE-2026-29202 CVE-2026-29203
We have currently locked down cPanel/WHM/FTP/SFTP/SSH/Webdisk access.
We expect cPanel to provide a patch for these vulnerabilities over the next 24 hours. Once we have more information and the restrictions have been lifted, we will update this status.
If you need any assistance with making modifications to your services, please reach out to our support team via an eTicket with the requested changes.
We’ll find your subscription and send you a link to login to manage your preferences.
We’ve found your existing subscription and have emailed you a secure link to manage your preferences.
We’ll use your email to save your preferences so you can update them later.
Subscribe to other services using the bell icon on the subscribe button on the status page.
You’ll no long receive any status updates from VentraIP Service Status, are you sure?
{{ error }}
We’ll no longer send you any status updates about VentraIP Service Status.