We are currently evaluating servers that failed to update (or had pre-existing update blockers), and we will be sending further updates as soon as more information is available. Network-level firewall blocks for cPanel, WHM, webmail, and webdisk ports remain in place at this time.
We appreciate your continued patience as we complete these actions to restore full service. If you have any questions in the meantime, please contact us for assistance.
Apr 29, 2026 - 01:32 EDT
cPanel has released a patch to address the authentication vulnerability that was identified today. Our engineers are currently working on deploying this patch across eligible cPanel services.
Once the patch is successfully applied, we will take the following actions: Remove the network-level firewall blocks: cPanel: 2082 / 2083 WHM: 2086 / 2087 Webmail: 2095 / 2096 Web Disk: 2077 / 2078
We appreciate your continued patience as we complete these actions to restore full service. If you have any questions in the meantime, please contact us for assistance.
Apr 28, 2026 - 17:57 EDT
Update - cPanel has disclosed that the additional cPanel-provided services Webmail and Web Disk are impacted by this vulnerability.
Out of an abundance of caution, and based on cPanel’s current recommendation, we are implementing temporary protective changes on servers hosted on our network.
Temporary changes being implemented: -Blocking access to ports related to cPanel services: WHM: 2082 / 2083 cPanel: 2086 / 2087 Webmail: 2096 / 2097 Web Disk: 2077 / 2078
-Temporarily disabling cpsrvd, which is the web wrapper for cPanel web services.As a result, cPanel, WHM, Webmail, Web Disk, and related cPanel services will be inaccessible, including over Cloud VPN connections.
These changes do not impact websites, email delivery, databases, or Apache functionality.
If you have further questions or need assistance, please contact our Support team.
Apr 28, 2026 - 17:13 EDT
Update - A brief configuration issue in our Ashburn (NTT) data center caused an un-intended disruption to outbound network traffic. Customers with servers in this location may have experienced intermittent connectivity or downtime lasting approximately 10 minutes. Our team quickly identified and corrected the issue. All services have since been restored and are functioning normally.
We continue to restrict access to cPanel/WHM interfaces on ports 2082, 2083, 2086, and 2087 across our data centers until a patch is released by cPanel.
If you need assistance with any cPanel/WHM items please reach out to support through live chat or a ticket.
We will provide additional updates to this status page as more information is made available.
Apr 28, 2026 - 16:12 EDT
Investigating - We are actively responding to a critical vulnerability affecting all versions of cPanel & WHM. This vulnerability impacts the authentication process and could allow unauthorized access if left unmitigated.
Our team is working alongside vendor guidance and implementing proactive safeguards to protect environments. As an immediate precaution, we have temporarily restricted access to cPanel/WHM interfaces on the following ports 2082, 2083, 2086, and 2087. Restricted access will remain in place until a patch is developed and deployed. This action is being taken to prevent potential unauthorized access while a permanent fix is finalized.
Impact: -Restricting access to cPanel/WHM Ports via a network firewall block. During this time customers will not be able to login to either WHM or cPanel unless they use a Cloud VPN Connection. -No impact to hosted websites, applications, email or services.
We are closely monitoring the official patch release from cPanel and will deploy it as quickly as possible. Once mitigations are no longer required, normal access will be restored.
If you require access to cPanel and WHM please feel free to reach out to us via chat or open up a support ticket with your request and we will be happy to assist you.
No additional action is required at this time. We will provide additional updates to this status page as more information is made available.
Apr 28, 2026 - 14:45 EDT
API
Operational
DNS
Operational
Cloud Dedicated
Operational
Cloud VPS Hosting
Operational
CPanel
Major Outage
InterWorx
Operational
Plesk
Operational
Object Storage
Operational
VMware Cloud
Operational
VMware Private Cloud
Operational
Business Email
Operational
Load Balancers
Operational
Cloud Load Balancers
Operational
Shared Load Balancers - DC2
Operational
Shared Load Balancers - DC3
Operational
Shared Load Balancers - DC4
Operational
Shared Load Balancers - DC5
Operational
Network
Operational
LAN Network
Operational
PHX Network
Operational
AMS Network
Operational
Data Centers
Operational
DC2 - LAN
Operational
DC3 - LAN
Operational
DC4 - PHX
Operational
EU - AMS
Operational
Management Portal
Operational
Support Services
Operational
Chat
Operational
Case
Operational
Phone
Operational
Operational
Degraded Performance
Partial Outage
Major Outage
Maintenance
Past Incidents
Apr 29, 2026
Unresolved incident: Critical Authentication Vulnerability on cPanel/WHM.
Completed -
The scheduled maintenance has been completed.
Apr 27, 10:00 EDT
In progress -
Scheduled maintenance is currently in progress. We will provide updates as necessary.
Apr 13, 10:00 EDT
Scheduled -
We will be performing scheduled maintenance on our object storage infrastructure to replace hardware components and optimize system balance. This routine maintenance is designed to enhance the long-term performance and stability of our data center environment.
Our engineering teams will be managing a hardware replacement and data rebalancing process over the coming days. This work is being performed to ensure the cluster remains well-balanced and operates within optimal capacity thresholds.
No customer impact is expected during this maintenance period. All work is being performed under strict change controls and will be closely monitored by our engineering teams to ensure a smooth and seamless experience. The optimization process is expected to take approximately one to two weeks to complete.
We appreciate your patience and understanding. If you need any assistance, our Support Team is available 24/7 via Live Chat or at support@liquidweb.com.
Apr 10, 18:06 EDT
Resolved -
This incident has been resolved.
Apr 24, 21:09 EDT
Monitoring -
We continue to actively monitor the situation related to unintended MySQL upgrades triggered via the MySQL-Community repo during cPanel nightly updates.
Our teams remain engaged with both the cPanel and MySQL teams, and their investigations are still ongoing. The previously identified workaround continues to be applied on affected systems to prevent further impact, and we are closely observing system stability. We understand the importance of a permanent resolution and will share further updates as soon as more information becomes available or once a fix is confirmed.
If you have any questions or need assistance, please reach out via Live Chat or by submitting a support case. Thank you for your continued patience.
Apr 24, 01:20 EDT
Update -
The cPanel nightly updates are triggering system updates, which has resulted in servers running MySQL 8.4 being upgraded to MySQL 9.7. This appears to be due to the official mysql-community.repo making MySQL 9.7 available, causing dnf/yum to recognise it as the latest version.
This issue stems from a bug within the MySQL repositories that is allowing automatic upgrades to the next major version. We have raised this with the MySQL team as well.
We are currently in touch with the cPanel team, who have opened an internal case and are actively investigating the matter. A workaround is being implemented on affected servers, and we will continue to provide updates here as more information becomes available.
If you have any questions or require assistance, please contact us via Live Chat or by submitting a support case.
Thank you for your patience and understanding.
Apr 23, 01:08 EDT
Identified -
We are currently observing MySQL failure alerts across multiple servers. Initial investigation indicates the issue may be related to an automatic upgrade from MySQL 8.4 to 9.7 via yum on systems using the MySQL Community repository (mysql-community.repo). This upgrade via the mysql-community repo is likely contributing to the ongoing service disruptions.
We have identified the issue, and our teams are actively working on remediation and service restoration.
If you have any questions or require assistance, please contact us via Live Chat or submit a support case.
Apr 22, 09:25 EDT
Investigating -
We are currently observing MySQL failure alerts across multiple servers. Initial investigation suggests the issue may be related to an automatic upgrade from MySQL 8.4 to 9.7 via yum on systems using the MySQL Community repository (mysql-community.repo). This upgrade via the mysql-community repo is likely contributing to the ongoing service disruptions.
If you have any questions or require assistance, please contact us via Live Chat or submit a support case.
We appreciate your patience and will continue to provide updates as progress is made.
Apr 22, 07:02 EDT
Resolved -
This incident has been resolved.
Apr 23, 01:55 EDT
Monitoring -
Our engineers have fixed the problematic switch, and it is now resolved. Affected services are coming back online, and we are currently monitoring to ensure stability.
We appreciate your patience as our team worked to resolve this issue.
If you have any further questions or concerns, please feel free to reach out to us via live chat in your customer portal.
Apr 22, 04:30 EDT
Investigating -
We are investigating network degradation affecting a subset of servers in our DC4 Data Center. You may experience intermittent latency or connectivity drops. Our Network team is currently analyzing traffic patterns and upstream connections to isolate the issue.
Need help? Chat with us or create a ticket via my.liquidweb.com.
We appreciate your patience and understanding as we work to restore this service. Thank you.
Apr 22, 03:35 EDT
Resolved -
This incident has been resolved. Our Engineering team has fully resolved the Spice Console access issue on Linux VPS Servers.
Access has been restored, and workflows are operating normally. Corrective measures have been implemented to address the root cause and help prevent recurrence.
Thank you for your patience and understanding throughout this process.
Apr 22, 19:56 EDT
Identified -
The issue has been identified and a fix is being implemented.
Apr 21, 07:47 EDT
Investigating -
We have identified that Spice Console at my.liquidweb.com/manage.liquidweb.com is not functioning as intended on Linux virtual private servers (VPS), while it is functioning as expected on Windows servers.
There are no issues with server stability or up-time related to this, however the servers cannot be reached via spice console. Our engineers are investigating and will provide updates as they become available.
If you have any questions or need assistance, please reach out to us via Live Chat or by submitting a support case.
We appreciate your patience and will provide updates as progress is made.
Apr 21, 04:40 EDT
Completed -
The scheduled maintenance has been completed.
Apr 20, 05:00 EDT
In progress -
Scheduled maintenance is currently in progress. We will provide updates as necessary.
Apr 20, 04:00 EDT
Scheduled -
Liquid Web Network Engineers will be performing scheduled maintenance to upgrade network infrastructure across our Ashburn-Lansing data center network systems.
There is no expected service interruption but some customers may experience brief packet loss, latency, or reconnection during the window.
Our support team is on standby if you need any help or have questions or concerns. You can connect with us through the following channels:
Completed -
The scheduled maintenance has been completed.
Apr 18, 15:00 EDT
In progress -
Scheduled maintenance is currently in progress. We will provide updates as necessary.
Apr 18, 09:00 EDT
Scheduled -
Liquidweb Data Center Engineers will be performing scheduled maintenance on a power infrastructure module within the DC2 data center. This maintenance is being carried out to improve system reliability and help prevent potential equipment issues or service disruptions in the future.
No customer service disruption is expected during this maintenance window.
The system will be continuously monitored throughout the maintenance by the Liquidweb Infrastructure team to ensure safe and proper operation at all times.
Our support team will be on standby should you have any questions or concerns. You can reach us via:
Resolved -
Our engineering teams have completed the planned security enhancements and hardening efforts related to the Magento "PolyShell" unrestricted file upload vulnerability across our managed environment.
With these measures now fully implemented, we consider this incident resolved.
As security is a shared responsibility, we recommend that customers review their Magento installations, ensure all updates and patches are applied, and take additional steps to further secure their applications.
If you have any questions or require assistance, please reach out via chat or support case.
Apr 15, 08:10 EDT
Update -
Our engineering teams have made significant progress in implementing additional security enhancements related to the Magento "PolyShell" unrestricted file upload vulnerability. At this stage, we are nearing completion of all planned mitigation efforts across our managed environment.
The measures deployed, including strengthened file upload validation, enhanced malware scanning to detect files, stricter execution controls, and broader platform hardening, have significantly reduced the risk of exploitation.
While these mitigations provide strong protection, security is a shared responsibility. We strongly encourage customers to review their Magento installations, ensure all updates and patches are applied, and follow general security best practices to help keep their sites secure.
If you have any questions or need assistance, please reach out to us through chat or via case.
We will provide further updates if any additional actions are required.
Apr 9, 09:27 EDT
Investigating -
Following the actions taken to prohibit execution of files exploiting the Magento “PolyShell” unrestricted file upload vulnerability, our engineering teams are continuing to implement additional security enhancements across our managed environment.
These efforts include strengthening file upload validation and execution restrictions, enhancing monitoring and detection mechanisms, and implementing additional hardening measures across Magento platforms. We are also conducting internal reviews to reduce potential attack surfaces and reinforce overall platform security.
These proactive improvements reflect our ongoing commitment to maintaining a secure and resilient hosting environment. While the initial issue has been addressed, we are taking additional steps to further strengthen our systems and help prevent future risks.
While the additional measures that we have deployed should reduce the risk for potential compromise, we strongly urge that our customers take proactive measures to review and secure their sites
Resolved -
All systems remain stable following remediation, and no new issues have been observed during the monitoring phase. We will continue to track updates from the upstream provider, and once a patched package is made available, we will schedule maintenance windows to roll out these changes in the future. Thank you for your patience.
Apr 15, 07:48 EDT
Monitoring -
All identified affected systems have now been remediated, and patching efforts have been completed across the environment. Service stability has been restored, and we have not observed any new issues since remediation was applied.
At this time, we will be transitioning to a monitoring phase to continue observing system performance and ensure ongoing stability.
Once a patched package is made available by the upstream provider, we will schedule maintenance windows to safely deploy the permanent fix across all systems.
We will continue to provide updates if any new developments arise.
If you have any questions or need assistance, please reach out to us via chat or by opening a support case.
Thank you for your patience.
Apr 14, 22:28 EDT
Update -
Patching and remediation efforts are ongoing across all affected systems. Our team has successfully stabilized a significant portion of impacted servers by disabling the incompatible repository where necessary, and we are continuing to review and remediate the remaining systems to ensure full stability.
We are actively investigating the root cause and working toward a permanent resolution, while closely monitoring system performance and service health throughout this process.
We will continue to provide updates as progress is made.
If you have any questions or need assistance, please reach out to us via chat or by opening a support case.
Thank you for your patience.
Apr 14, 20:33 EDT
Identified -
We are currently investigating an issue affecting a subset of servers where the imunify360-ea-php-hardened repository is incompatible with certain packages installed on the systems. As a result of this incompatible update, Apache service stability may be impacted, and in some cases may require manual intervention to restore service on affected hosts. As an immediate step, we are turning off the imunify360-ea-php-hardened repository on affected systems to help restore service stability.
Our engineering team is actively monitoring for this condition and is working closely with cPanel and CloudLinux support to identify the root cause and implement a stable and permanent resolution.
Apr 14, 11:44 EDT