In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Apr 13, 2026 - 10:00 EDT
Scheduled - We will be performing scheduled maintenance on our object storage infrastructure to replace hardware components and optimize system balance. This routine maintenance is designed to enhance the long-term performance and stability of our data center environment.

Our engineering teams will be managing a hardware replacement and data rebalancing process over the coming days. This work is being performed to ensure the cluster remains well-balanced and operates within optimal capacity thresholds.

No customer impact is expected during this maintenance period. All work is being performed under strict change controls and will be closely monitored by our engineering teams to ensure a smooth and seamless experience.
The optimization process is expected to take approximately one to two weeks to complete.

We appreciate your patience and understanding. If you need any assistance, our Support Team is available 24/7 via Live Chat or at support@liquidweb.com.

Apr 13, 2026 10:00 - Apr 27, 2026 10:00 EDT
API Operational
DNS Operational
Cloud Dedicated Operational
Cloud VPS Hosting Operational
CPanel Operational
InterWorx Operational
Plesk Operational
Object Storage Under Maintenance
VMware Cloud Operational
VMware Private Cloud Operational
Business Email Operational
Load Balancers Operational
Cloud Load Balancers Operational
Shared Load Balancers - DC2 Operational
Shared Load Balancers - DC3 Operational
Shared Load Balancers - DC4 Operational
Shared Load Balancers - DC5 Operational
Network Operational
LAN Network Operational
PHX Network Operational
AMS Network Operational
Data Centers Operational
DC2 - LAN Operational
DC3 - LAN Operational
DC4 - PHX Operational
EU - AMS Operational
Management Portal Operational
Support Services Operational
Chat Operational
Case Operational
Phone Operational
Operational
Degraded Performance
Partial Outage
Major Outage
Maintenance
Apr 25, 2026

No incidents reported today.

Apr 24, 2026
Resolved - This incident has been resolved.
Apr 24, 21:09 EDT
Monitoring - We continue to actively monitor the situation related to unintended MySQL upgrades triggered via the MySQL-Community repo during cPanel nightly updates.

Our teams remain engaged with both the cPanel and MySQL teams, and their investigations are still ongoing.
The previously identified workaround continues to be applied on affected systems to prevent further impact, and we are closely observing system stability.
We understand the importance of a permanent resolution and will share further updates as soon as more information becomes available or once a fix is confirmed.

If you have any questions or need assistance, please reach out via Live Chat or by submitting a support case.
Thank you for your continued patience.

Apr 24, 01:20 EDT
Update - The cPanel nightly updates are triggering system updates, which has resulted in servers running MySQL 8.4 being upgraded to MySQL 9.7. This appears to be due to the official mysql-community.repo making MySQL 9.7 available, causing dnf/yum to recognise it as the latest version.

This issue stems from a bug within the MySQL repositories that is allowing automatic upgrades to the next major version. We have raised this with the MySQL team as well.

We are currently in touch with the cPanel team, who have opened an internal case and are actively investigating the matter. A workaround is being implemented on affected servers, and we will continue to provide updates here as more information becomes available.

If you have any questions or require assistance, please contact us via Live Chat or by submitting a support case.

Thank you for your patience and understanding.

Apr 23, 01:08 EDT
Identified - We are currently observing MySQL failure alerts across multiple servers. Initial investigation indicates the issue may be related to an automatic upgrade from MySQL 8.4 to 9.7 via yum on systems using the MySQL Community repository (mysql-community.repo). This upgrade via the mysql-community repo is likely contributing to the ongoing service disruptions.

We have identified the issue, and our teams are actively working on remediation and service restoration.

If you have any questions or require assistance, please contact us via Live Chat or submit a support case.

Apr 22, 09:25 EDT
Investigating - We are currently observing MySQL failure alerts across multiple servers. Initial investigation suggests the issue may be related to an automatic upgrade from MySQL 8.4 to 9.7 via yum on systems using the MySQL Community repository (mysql-community.repo). This upgrade via the mysql-community repo is likely contributing to the ongoing service disruptions.

If you have any questions or require assistance, please contact us via Live Chat or submit a support case.

We appreciate your patience and will continue to provide updates as progress is made.

Apr 22, 07:02 EDT
Apr 23, 2026
Resolved - This incident has been resolved.
Apr 23, 01:55 EDT
Monitoring - Our engineers have fixed the problematic switch, and it is now resolved. Affected services are coming back online, and we are currently monitoring to ensure stability.

We appreciate your patience as our team worked to resolve this issue.

If you have any further questions or concerns, please feel free to reach out to us via live chat in your customer portal.

Apr 22, 04:30 EDT
Investigating - We are investigating network degradation affecting a subset of servers in our DC4 Data Center. You may experience intermittent latency or connectivity drops. Our Network team is currently analyzing traffic patterns and upstream connections to isolate the issue.

Need help? Chat with us or create a ticket via my.liquidweb.com.

We appreciate your patience and understanding as we work to restore this service. Thank you.

Apr 22, 03:35 EDT
Apr 22, 2026
Resolved - This incident has been resolved. Our Engineering team has fully resolved the Spice Console access issue on Linux VPS Servers.

Access has been restored, and workflows are operating normally. Corrective measures have been implemented to address the root cause and help prevent recurrence.

Thank you for your patience and understanding throughout this process.

Apr 22, 19:56 EDT
Identified - The issue has been identified and a fix is being implemented.
Apr 21, 07:47 EDT
Investigating - We have identified that Spice Console at my.liquidweb.com/manage.liquidweb.com is not functioning as intended on Linux virtual private servers (VPS), while it is functioning as expected on Windows servers.

There are no issues with server stability or up-time related to this, however the servers cannot be reached via spice console.
Our engineers are investigating and will provide updates as they become available.

If you have any questions or need assistance, please reach out to us via Live Chat or by submitting a support case.

We appreciate your patience and will provide updates as progress is made.

Apr 21, 04:40 EDT
Apr 21, 2026
Apr 20, 2026
Completed - The scheduled maintenance has been completed.
Apr 20, 05:00 EDT
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Apr 20, 04:00 EDT
Scheduled - Liquid Web Network Engineers will be performing scheduled maintenance to upgrade network infrastructure across our Ashburn-Lansing data center network systems.

There is no expected service interruption but some customers may experience brief packet loss, latency, or reconnection during the window.

Our support team is on standby if you need any help or have questions or concerns. You can connect with us through the following channels:

Live Chat: https://my.liquidweb.com/
Email: support@liquidweb.com

We appreciate your understanding and patience as we work to provide you with a better service.
Thank you for your continued support.

System Maintenance Reference: [CC-13392]

Apr 17, 12:01 EDT
Apr 19, 2026

No incidents reported.

Apr 18, 2026
Completed - The scheduled maintenance has been completed.
Apr 18, 15:00 EDT
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Apr 18, 09:00 EDT
Scheduled - Liquidweb Data Center Engineers will be performing scheduled maintenance on a power infrastructure module within the DC2 data center. This maintenance is being carried out to improve system reliability and help prevent potential equipment issues or service disruptions in the future.

No customer service disruption is expected during this maintenance window.

The system will be continuously monitored throughout the maintenance by the Liquidweb Infrastructure team to ensure safe and proper operation at all times.

Our support team will be on standby should you have any questions or concerns. You can reach us via:

Live Chat: https://portal.liquidweb.com/
Email: support@liquidweb.com

We appreciate your understanding and patience as we continue working to improve the reliability and performance of our infrastructure.

System Maintenance Reference: CC-13388

Apr 17, 12:46 EDT
Apr 17, 2026

No incidents reported.

Apr 16, 2026

No incidents reported.

Apr 15, 2026
Resolved - Our engineering teams have completed the planned security enhancements and hardening efforts related to the Magento "PolyShell" unrestricted file upload vulnerability across our managed environment.

With these measures now fully implemented, we consider this incident resolved.

As security is a shared responsibility, we recommend that customers review their Magento installations, ensure all updates and patches are applied, and take additional steps to further secure their applications.

If you have any questions or require assistance, please reach out via chat or support case.

Apr 15, 08:10 EDT
Update - Our engineering teams have made significant progress in implementing additional security enhancements related to the Magento "PolyShell" unrestricted file upload vulnerability. At this stage, we are nearing completion of all planned mitigation efforts across our managed environment.

The measures deployed, including strengthened file upload validation, enhanced malware scanning to detect files, stricter execution controls, and broader platform hardening, have significantly reduced the risk of exploitation.

While these mitigations provide strong protection, security is a shared responsibility. We strongly encourage customers to review their Magento installations, ensure all updates and patches are applied, and follow general security best practices to help keep their sites secure.

If you have any questions or need assistance, please reach out to us through chat or via case.

We will provide further updates if any additional actions are required.

Apr 9, 09:27 EDT
Investigating - Following the actions taken to prohibit execution of files exploiting the Magento “PolyShell” unrestricted file upload vulnerability, our engineering teams are continuing to implement additional security enhancements across our managed environment.

These efforts include strengthening file upload validation and execution restrictions, enhancing monitoring and detection mechanisms, and implementing additional hardening measures across Magento platforms. We are also conducting internal reviews to reduce potential attack surfaces and reinforce overall platform security.

These proactive improvements reflect our ongoing commitment to maintaining a secure and resilient hosting environment. While the initial issue has been addressed, we are taking additional steps to further strengthen our systems and help prevent future risks.

While the additional measures that we have deployed should reduce the risk for potential compromise, we strongly urge that our customers take proactive measures to review and secure their sites

If you have any questions or concerns, please reach out to us through the following channels:
Live Chat: https://my.liquidweb.com/
Email: support@liquidweb.com.

We will continue to share updates as these enhancements are completed.

Apr 1, 14:42 EDT
Resolved - All systems remain stable following remediation, and no new issues have been observed during the monitoring phase.
We will continue to track updates from the upstream provider, and once a patched package is made available, we will schedule maintenance windows to roll out these changes in the future.
Thank you for your patience.

Apr 15, 07:48 EDT
Monitoring - All identified affected systems have now been remediated, and patching efforts have been completed across the environment. Service stability has been restored, and we have not observed any new issues since remediation was applied.

At this time, we will be transitioning to a monitoring phase to continue observing system performance and ensure ongoing stability.

Once a patched package is made available by the upstream provider, we will schedule maintenance windows to safely deploy the permanent fix across all systems.

We will continue to provide updates if any new developments arise.

If you have any questions or need assistance, please reach out to us via chat or by opening a support case.

Thank you for your patience.

Apr 14, 22:28 EDT
Update - Patching and remediation efforts are ongoing across all affected systems. Our team has successfully stabilized a significant portion of impacted servers by disabling the incompatible repository where necessary, and we are continuing to review and remediate the remaining systems to ensure full stability.

We are actively investigating the root cause and working toward a permanent resolution, while closely monitoring system performance and service health throughout this process.

We will continue to provide updates as progress is made.

If you have any questions or need assistance, please reach out to us via chat or by opening a support case.

Thank you for your patience.

Apr 14, 20:33 EDT
Identified - We are currently investigating an issue affecting a subset of servers where the imunify360-ea-php-hardened repository is incompatible with certain packages installed on the systems. As a result of this incompatible update, Apache service stability may be impacted, and in some cases may require manual intervention to restore service on affected hosts. As an immediate step, we are turning off the imunify360-ea-php-hardened repository on affected systems to help restore service stability.

Our engineering team is actively monitoring for this condition and is working closely with cPanel and CloudLinux support to identify the root cause and implement a stable and permanent resolution.

Apr 14, 11:44 EDT
Apr 14, 2026
Apr 13, 2026
Completed - The scheduled maintenance has been completed.
Apr 13, 06:00 EDT
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Apr 13, 04:00 EDT
Scheduled - We will be performing scheduled network maintenance to apply updates that enhance the long-term performance, stability, and security of our infrastructure. During this window, our teams will also complete validation and testing to ensure all recent changes continue to operate as expected across our Ashburn-Lansing data center network systems.

There should be no impact on clients; however, it's possible some may experience less than 1 minute of packet loss. All work is being performed under strict change controls and will be closely monitored by our engineering teams to ensure a smooth and seamless experience.

We appreciate your patience and understanding. If you need any assistance, our Support Team is available 24/7 via Live Chat or at support@liquidweb.com

Apr 10, 18:30 EDT
Apr 12, 2026

No incidents reported.

Apr 11, 2026

No incidents reported.