AKLWEB HOST LLC
 
Some Systems Are Experiencing Issues

AKLWEB HOST LLC Status System

Welcome to the AKLWEB HOST LLC Status website. Here, you can view the status of all AKLWEB HOST LLC services across all products and availability zones (AZs).

Current Incidents

Thursday 30th April 2026

cPanel Hosting Server Node - 1 Critical Authentication Vulnerability on cPanel/WHM

We are actively responding to a critical vulnerability affecting all versions of cPanel & WHM. This vulnerability impacts the authentication process and could allow unauthorized access if left unmitigated.

More information from cPanel is available here: https://support.cpanel.net/hc/en-us/articles/40073787579671-Critical-Vulnerability-with-cPanel-WHM-Login-Authentication

Our team is working alongside vendor guidance and implementing proactive safeguards to protect environments. As an immediate precaution, we have temporarily restricted access to cPanel/WHM interfaces on the following ports 2082, 2083, 2086, and 2087. Restricted access will remain in place until a patch is developed and deployed. This action is being taken to prevent potential unauthorized access while a permanent fix is finalized.

Impact:

-Restricting access to cPanel/WHM Ports via a network firewall block. During this time customers will not be able to login to either WHM or cPanel.

-No impact to hosted websites, applications, email or services.

We are closely monitoring the official patch release from cPanel and will deploy it as quickly as possible. Once mitigations are no longer required, normal access will be restored.

No additional action is required at this time. We will provide additional updates to this status page as more information is made available.

  • Update: cPanel Patches Deployed

    cPanel patches have been deployed across all eligible servers. As mitigation measures are now in place for the majority of systems, we have lifted the temporary network-level blocks that were implemented to prevent unauthorized access.

    For servers ineligible for the patch, we are applying temporary protections at the server level using CSF. As part of this step, CSF rules are being implemented to restrict access to the affected ports. This approach allows access to be controlled by whitelisting trusted client IP addresses while maintaining appropriate security protections.

    We strongly recommend that all customers update to the latest version of cPanel & WHM as soon as possible to ensure full protection against this vulnerability. For servers not eligible for the patch, we will be reaching out shortly with guidance on what options are available to secure your environment.

    We will continue to closely monitor the situation and take any additional steps necessary to maintain system security and stability. If you need assistance with updating cPanel or have any concerns, please contact our Support team.

  • Update: cPanel Patch Deployment Underway

    cPanel has released a patch to address the authentication vulnerability that was identified today. Our engineers are currently working on deploying this patch across eligible cPanel services.

    Once the patch is successfully applied, we will take the following actions:

    Remove the network-level firewall blocks:

    cPanel: 2082 / 2083

    WHM: 2086 / 2087

    Webmail: 2095 / 2096

    Web Disk: 2077 / 2078

    More information from cPanel is available here: https://support.cpanel.net/hc/en-us/articles/40073787579671-Critical-Vulnerability-with-cPanel-WHM-Login-Authentication

    We appreciate your continued patience as we complete these actions to restore full service. If you have any questions in the meantime, please contact us for assistance.

  • Update: cPanel Company Review

    cPanel has disclosed that the additional cPanel-provided services Webmail and Web Disk are impacted by this vulnerability.

    Out of an abundance of caution, and based on cPanel’s current recommendation, we are implementing temporary protective changes on servers hosted on our network.

    Temporary changes being implemented:

    -Blocking access to ports related to cPanel services.

    WHM: 2082 / 2083

    cPanel: 2086 / 2087

    Webmail: 2096 / 2097

    Web Disk: 2077 / 2078

    -Temporarily disabling cpsrvd, which is the web wrapper for cPanel web services.As a result, cPanel, WHM, Webmail, Web Disk, and related cPanel services will be inaccessible, including over Cloud VPN connections.

    These changes do not impact websites, email delivery, databases, or Apache functionality.

    These temporary restrictions will be reverted as soon as cPanel releases a patch addressing the critical vulnerabilities.

    Additional information from cPanel is available here: https://support.cpanel.net/hc/en-us/articles/40073787579671-Critical-Vulnerability-with-cPanel-WHM-Login-Authentication

    If you have further questions or need assistance, please contact our Support team.

  • Past Incidents

    Wednesday 29th April 2026

    No incidents reported

    Tuesday 28th April 2026

    No incidents reported

    Monday 27th April 2026

    DNS Server Node MySQL Service Disruption via MySQL-community repo

    We are currently observing MySQL failure alerts across multiple servers. Initial investigation suggests the issue may be related to an automatic upgrade from MySQL 8.4 to 9.7 via yum on systems using the MySQL Community repository (mysql-community.repo). This upgrade via the mysql-community repo is likely contributing to the ongoing service disruptions.

    If you need assistance, please chat with us or submit a ticket at Submit A Support Ticket.

    We appreciate your patience and will continue to provide updates as progress is made.

  • This incident has been resolved.

  • We continue to actively monitor the situation related to unintended MySQL upgrades triggered via the MySQL-Community repo during cPanel nightly updates.

    Our teams remain engaged with both the cPanel and MySQL teams, and their investigations are still ongoing. The previously identified workaround continues to be applied on affected systems to prevent further impact, and we are closely observing system stability. We understand the importance of a permanent resolution and will share further updates as soon as more information becomes available or once a fix is confirmed.

    We appreciate your patience and will continue to provide updates as progress is made.

    Thank you for your patience and understanding.

  • The cPanel nightly updates are triggering system updates, which has resulted in servers running MySQL 8.4 being upgraded to MySQL 9.7. This appears to be due to the official mysql-community.repo making MySQL 9.7 available, causing dnf/yum to recognise it as the latest version.

    This issue stems from a bug within the MySQL repositories that is allowing automatic upgrades to the next major version. We have raised this with the MySQL team as well.

    We are currently in touch with the cPanel team, who have opened an internal case and are actively investigating the matter. A workaround is being implemented on affected servers, and we will continue to provide updates here as more information becomes available.

    We appreciate your patience and will continue to provide updates as progress is made.

    Thank you for your patience and understanding.

  • We are currently observing MySQL failure alerts across multiple servers. Initial investigation indicates the issue may be related to an automatic upgrade from MySQL 8.4 to 9.7 via yum on systems using the MySQL Community repository (mysql-community.repo). This upgrade via the mysql-community repo is likely contributing to the ongoing service disruptions.

    We have identified the issue, and our teams are actively working on remediation and service restoration.

    We appreciate your patience and will continue to provide updates as progress is made.

  • Sunday 26th April 2026

    No incidents reported

    Saturday 25th April 2026

    No incidents reported

    Friday 24th April 2026

    No incidents reported

    Thursday 23rd April 2026

    No incidents reported

    Copyright © 2026 AKLWEB HOST LLC. All Rights Reserved.