CVE-2026-29202
cPanel · Nova Plugin
Insufficient input validation in the cPanel Nova plugin's `create_user` function allows for arbitrary Perl code execution.
Executive summary
A critical vulnerability in the cPanel Nova plugin allows authenticated users to execute arbitrary Perl code, leading to potential full system compromise.
Vulnerability
The vulnerability stems from insufficient input validation of the plugin parameter within the create_user function. This flaw allows an authenticated account holder to execute arbitrary Perl code with the privileges of the system user running the plugin.
Business impact
With a CVSS score of 8.8, this vulnerability poses a severe threat to hosting environments. Successful exploitation allows for privilege escalation and arbitrary code execution, enabling an attacker to gain full control over the server and access all hosted data.
Remediation
Immediate Action: Update the cPanel Nova plugin to the latest vendor-provided version that includes the input validation patch.
Proactive Monitoring: Inspect system logs for unexpected execution of Perl scripts or anomalous processes initiated by the cPanel user.
Compensating Controls: Temporarily disable the create_user functionality within the Nova plugin if a patch cannot be immediately deployed.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The severity of this remote code execution flaw requires immediate patching. Administrators should audit their cPanel environments for the presence of the Nova plugin and ensure all updates are applied to mitigate the risk of server-wide compromise.