...

Security advisory: cve-2026-29204 – critical whmcs authorization bypass vulnerability

Security Advisory: CVE-2026-29204 – Critical WHMCS Authorization Bypass Vulnerability

Severity: Critical
CVSS Score: 9.1–10.0 (Critical)
Affected Software: WHMCS
Affected Versions:

  • WHMCS 7.4.0 through 8.12.2
  • WHMCS 8.13.x prior to 8.13.3
  • WHMCS 9.0.x prior to 9.0.4

Overview

A critical authorization bypass vulnerability identified as CVE-2026-29204 has been disclosed in WHMCS. The issue exists due to insufficient ownership validation in clientarea.php, specifically involving manipulation of the addonId parameter. An authenticated client-area user may exploit this flaw to gain unauthorized access to another customer’s hosting resources and associated cPanel account.

This vulnerability is classified under CWE-639: Authorization Bypass Through User-Controlled Key.

Technical Details

The vulnerability occurs because WHMCS fails to properly verify whether the supplied addonId belongs to the currently authenticated user before processing requests.

An attacker can:

  • Modify requests in the client area
  • Supply another customer’s addonId
  • Bypass ownership validation
  • Access or manipulate services associated with another account
  • Potentially gain unauthorized cPanel access

The flaw affects environments where addon/service actions are exposed through the WHMCS client area.

Potential Impact

Successful exploitation may allow attackers to:

  • Access other customers’ hosting services
  • Gain unauthorized cPanel access
  • View or modify account data
  • Manipulate addon configurations
  • Compromise confidentiality and integrity of hosted environments

No widespread active exploitation has yet been confirmed publicly; however, proof-of-concept discussion and temporary mitigation hooks are already circulating publicly.

Official Patched Versions

WHMCS has released security updates addressing the issue.

Upgrade Immediately To

  • WHMCS 8.13.3
  • WHMCS 9.0.4

These versions contain the required ownership validation fixes.

Immediate Resolution Steps

  1. Backup Your WHMCS Installation
    Before upgrading:

  2. Upgrade WHMCS
    Download the latest patched release from WHMCS:

    • Upgrade to 8.13.3 or later
    • Upgrade to 9.0.4 or later

    Ensure all files are fully replaced and caches cleared after upgrade.

  3. Verify Upgrade Success
    After upgrading:

    • Confirm version in WHMCS Admin Dashboard
    • Verify no old files remain
    • Review activity logs for unusual addon access attempts
  4. Audit Client Activity
    Review:

    • WHMCS Activity Logs
    • cPanel access logs
    • Authentication records
    • Suspicious addon/service actions

    Look for unusual requests involving unexpected addonId values.

Temporary Mitigation (If Immediate Upgrade Is Not Possible)

If you cannot immediately patch:

Restrict Addon Access

Temporarily disable or restrict addon/service management functionality from the client area.

Implement Server-Side Validation

Add ownership validation checks ensuring:

if ($addon->userid != $_SESSION['uid']) {
    exit('Unauthorized Access');
}

This should be applied wherever addonId is processed.

Recommended Security Actions

Rotate Sensitive Credentials

If compromise is suspected:

  • Reset WHMCS admin passwords
  • Reset customer cPanel passwords
  • Rotate API tokens
  • Rotate reseller credentials

Enable Additional Monitoring

Monitor for:

  • Cross-account service access
  • Abnormal addon requests
  • Unexpected client area activity
  • Suspicious API usage

Harden WHMCS Security

Recommended best practices:

  • Enforce MFA for admins
  • Restrict admin access by IP
  • Keep WHMCS continuously updated
  • Limit third-party modules
  • Enable detailed audit logging

Indicators of Possible Exploitation

Potential signs include:

  • Customers reporting unauthorized access
  • Unexpected addon/service modifications
  • Unrecognized cPanel logins
  • Cross-account access behavior
  • Suspicious requests containing modified addonId values
Avatar of editorial staff

Editorial Staff

Rad Web Hosting is a leading provider of web hosting, Cloud VPS, and Dedicated Servers in Dallas, TX.
lg