Update - cPanel patches have been deployed across all eligible servers.
For a subset of systems running versions that cannot be updated, additional security protections are being implemented to allow continued access to cPanel services while maintaining necessary safeguards.
To ensure ongoing protection, cPanel service ports will remain restricted on these systems. Customers who prefer to fully restore standard access will need to update to a supported version of cPanel.
Our team will be reaching out with guidance on available options. If you have questions or need assistance, please contact Support.
Apr 29, 2026 - 18:15 EDT
Update - cPanel patches have been deployed across all eligible servers. As mitigation measures are now in place for the majority of systems, we have lifted the temporary network-level blocks that were implemented to prevent unauthorized access.
For servers ineligible for the patch, we are applying temporary protections at the server level using CSF. As part of this step, CSF rules are being implemented to restrict access to the affected ports. This approach allows access to be controlled by whitelisting trusted client IP addresses while maintaining appropriate security protections.
We strongly recommend that all customers update to the latest version of cPanel & WHM as soon as possible to ensure full protection against this vulnerability. For servers not eligible for the patch, we will be reaching out shortly with guidance on what options are available to secure your environment.
We will continue to closely monitor the situation and take any additional steps necessary to maintain system security and stability. If you need assistance with updating cPanel or have any concerns, please contact our Support team.
Apr 29, 2026 - 12:44 EDT
Update - The cPanel patch remains deployed across eligible systems, and network-level firewall restrictions for cPanel, WHM, webmail, and web disk ports are still in place at this time.
Our team is reconvening this morning to review overall progress, evaluate any remaining update exceptions, and determine the appropriate timing for safely removing these access restrictions.
We will provide additional updates as soon as more information becomes available.
We appreciate your continued patience as we work toward restoring full access. If you have any issues in the meantime, please contact our support team for assistance.
Apr 29, 2026 - 09:08 EDT
Update - Update: cPanel patch implemented.
We have deployed cPanel’s latest patch across eligible servers.
We are currently evaluating servers that failed to update (or had pre-existing update blockers), and we will be sending further updates as soon as more information is available. Network-level firewall blocks for cPanel, WHM, webmail, and webdisk ports remain in place at this time.
We appreciate your continued patience as we complete these actions to restore full service. If you have any questions in the meantime, please contact us for assistance.
Apr 29, 2026 - 01:32 EDT
cPanel has released a patch to address the authentication vulnerability that was identified today. Our engineers are currently working on deploying this patch across eligible cPanel services.
Once the patch is successfully applied, we will take the following actions: Remove the network-level firewall blocks: cPanel: 2082 / 2083 WHM: 2086 / 2087 Webmail: 2095 / 2096 Web Disk: 2077 / 2078
We appreciate your continued patience as we complete these actions to restore full service. If you have any questions in the meantime, please contact us for assistance.
Apr 28, 2026 - 17:57 EDT
Update - cPanel has disclosed that the additional cPanel-provided services Webmail and Web Disk are impacted by this vulnerability.
Out of an abundance of caution, and based on cPanel’s current recommendation, we are implementing temporary protective changes on servers hosted on our network.
Temporary changes being implemented: -Blocking access to ports related to cPanel services: WHM: 2082 / 2083 cPanel: 2086 / 2087 Webmail: 2096 / 2097 Web Disk: 2077 / 2078
-Temporarily disabling cpsrvd, which is the web wrapper for cPanel web services.As a result, cPanel, WHM, Webmail, Web Disk, and related cPanel services will be inaccessible, including over Cloud VPN connections.
These changes do not impact websites, email delivery, databases, or Apache functionality.
If you have further questions or need assistance, please contact our Support team.
Apr 28, 2026 - 17:13 EDT
Update - A brief configuration issue in our Ashburn (NTT) data center caused an un-intended disruption to outbound network traffic. Customers with servers in this location may have experienced intermittent connectivity or downtime lasting approximately 10 minutes. Our team quickly identified and corrected the issue. All services have since been restored and are functioning normally.
We continue to restrict access to cPanel/WHM interfaces on ports 2082, 2083, 2086, and 2087 across our data centers until a patch is released by cPanel.
If you need assistance with any cPanel/WHM items please reach out to support through live chat or a ticket.
We will provide additional updates to this status page as more information is made available.
Apr 28, 2026 - 16:12 EDT
Investigating - We are actively responding to a critical vulnerability affecting all versions of cPanel & WHM. This vulnerability impacts the authentication process and could allow unauthorized access if left unmitigated.
Our team is working alongside vendor guidance and implementing proactive safeguards to protect environments. As an immediate precaution, we have temporarily restricted access to cPanel/WHM interfaces on the following ports 2082, 2083, 2086, and 2087. Restricted access will remain in place until a patch is developed and deployed. This action is being taken to prevent potential unauthorized access while a permanent fix is finalized.
Impact: -Restricting access to cPanel/WHM Ports via a network firewall block. During this time customers will not be able to login to either WHM or cPanel unless they use a Cloud VPN Connection. -No impact to hosted websites, applications, email or services.
We are closely monitoring the official patch release from cPanel and will deploy it as quickly as possible. Once mitigations are no longer required, normal access will be restored.
If you require access to cPanel and WHM please feel free to reach out to us via chat or open up a support ticket with your request and we will be happy to assist you.
No additional action is required at this time. We will provide additional updates to this status page as more information is made available.
Apr 28, 2026 - 14:45 EDT
API
Operational
DNS
Operational
Cloud Dedicated
Operational
Cloud VPS Hosting
Operational
CPanel
Major Outage
InterWorx
Operational
Plesk
Operational
Object Storage
Operational
VMware Cloud
Operational
VMware Private Cloud
Operational
Business Email
Operational
Load Balancers
Operational
Cloud Load Balancers
Operational
Shared Load Balancers - DC2
Operational
Shared Load Balancers - DC3
Operational
Shared Load Balancers - DC4
Operational
Shared Load Balancers - DC5
Operational
Network
Operational
LAN Network
Operational
PHX Network
Operational
AMS Network
Operational
Data Centers
Operational
DC2 - LAN
Operational
DC3 - LAN
Operational
DC4 - PHX
Operational
EU - AMS
Operational
Management Portal
Operational
Support Services
Operational
Chat
Operational
Case
Operational
Phone
Operational
Operational
Degraded Performance
Partial Outage
Major Outage
Maintenance
Past Incidents
May 1, 2026
No incidents reported today.
Apr 30, 2026
No incidents reported.
Apr 29, 2026
Unresolved incident: Critical Authentication Vulnerability on cPanel/WHM.
Completed -
The scheduled maintenance has been completed.
Apr 27, 10:00 EDT
In progress -
Scheduled maintenance is currently in progress. We will provide updates as necessary.
Apr 13, 10:00 EDT
Scheduled -
We will be performing scheduled maintenance on our object storage infrastructure to replace hardware components and optimize system balance. This routine maintenance is designed to enhance the long-term performance and stability of our data center environment.
Our engineering teams will be managing a hardware replacement and data rebalancing process over the coming days. This work is being performed to ensure the cluster remains well-balanced and operates within optimal capacity thresholds.
No customer impact is expected during this maintenance period. All work is being performed under strict change controls and will be closely monitored by our engineering teams to ensure a smooth and seamless experience. The optimization process is expected to take approximately one to two weeks to complete.
We appreciate your patience and understanding. If you need any assistance, our Support Team is available 24/7 via Live Chat or at support@liquidweb.com.
Apr 10, 18:06 EDT
Resolved -
This incident has been resolved.
Apr 24, 21:09 EDT
Monitoring -
We continue to actively monitor the situation related to unintended MySQL upgrades triggered via the MySQL-Community repo during cPanel nightly updates.
Our teams remain engaged with both the cPanel and MySQL teams, and their investigations are still ongoing. The previously identified workaround continues to be applied on affected systems to prevent further impact, and we are closely observing system stability. We understand the importance of a permanent resolution and will share further updates as soon as more information becomes available or once a fix is confirmed.
If you have any questions or need assistance, please reach out via Live Chat or by submitting a support case. Thank you for your continued patience.
Apr 24, 01:20 EDT
Update -
The cPanel nightly updates are triggering system updates, which has resulted in servers running MySQL 8.4 being upgraded to MySQL 9.7. This appears to be due to the official mysql-community.repo making MySQL 9.7 available, causing dnf/yum to recognise it as the latest version.
This issue stems from a bug within the MySQL repositories that is allowing automatic upgrades to the next major version. We have raised this with the MySQL team as well.
We are currently in touch with the cPanel team, who have opened an internal case and are actively investigating the matter. A workaround is being implemented on affected servers, and we will continue to provide updates here as more information becomes available.
If you have any questions or require assistance, please contact us via Live Chat or by submitting a support case.
Thank you for your patience and understanding.
Apr 23, 01:08 EDT
Identified -
We are currently observing MySQL failure alerts across multiple servers. Initial investigation indicates the issue may be related to an automatic upgrade from MySQL 8.4 to 9.7 via yum on systems using the MySQL Community repository (mysql-community.repo). This upgrade via the mysql-community repo is likely contributing to the ongoing service disruptions.
We have identified the issue, and our teams are actively working on remediation and service restoration.
If you have any questions or require assistance, please contact us via Live Chat or submit a support case.
Apr 22, 09:25 EDT
Investigating -
We are currently observing MySQL failure alerts across multiple servers. Initial investigation suggests the issue may be related to an automatic upgrade from MySQL 8.4 to 9.7 via yum on systems using the MySQL Community repository (mysql-community.repo). This upgrade via the mysql-community repo is likely contributing to the ongoing service disruptions.
If you have any questions or require assistance, please contact us via Live Chat or submit a support case.
We appreciate your patience and will continue to provide updates as progress is made.
Apr 22, 07:02 EDT
Resolved -
This incident has been resolved.
Apr 23, 01:55 EDT
Monitoring -
Our engineers have fixed the problematic switch, and it is now resolved. Affected services are coming back online, and we are currently monitoring to ensure stability.
We appreciate your patience as our team worked to resolve this issue.
If you have any further questions or concerns, please feel free to reach out to us via live chat in your customer portal.
Apr 22, 04:30 EDT
Investigating -
We are investigating network degradation affecting a subset of servers in our DC4 Data Center. You may experience intermittent latency or connectivity drops. Our Network team is currently analyzing traffic patterns and upstream connections to isolate the issue.
Need help? Chat with us or create a ticket via my.liquidweb.com.
We appreciate your patience and understanding as we work to restore this service. Thank you.
Apr 22, 03:35 EDT
Resolved -
This incident has been resolved. Our Engineering team has fully resolved the Spice Console access issue on Linux VPS Servers.
Access has been restored, and workflows are operating normally. Corrective measures have been implemented to address the root cause and help prevent recurrence.
Thank you for your patience and understanding throughout this process.
Apr 22, 19:56 EDT
Identified -
The issue has been identified and a fix is being implemented.
Apr 21, 07:47 EDT
Investigating -
We have identified that Spice Console at my.liquidweb.com/manage.liquidweb.com is not functioning as intended on Linux virtual private servers (VPS), while it is functioning as expected on Windows servers.
There are no issues with server stability or up-time related to this, however the servers cannot be reached via spice console. Our engineers are investigating and will provide updates as they become available.
If you have any questions or need assistance, please reach out to us via Live Chat or by submitting a support case.
We appreciate your patience and will provide updates as progress is made.
Apr 21, 04:40 EDT
Completed -
The scheduled maintenance has been completed.
Apr 20, 05:00 EDT
In progress -
Scheduled maintenance is currently in progress. We will provide updates as necessary.
Apr 20, 04:00 EDT
Scheduled -
Liquid Web Network Engineers will be performing scheduled maintenance to upgrade network infrastructure across our Ashburn-Lansing data center network systems.
There is no expected service interruption but some customers may experience brief packet loss, latency, or reconnection during the window.
Our support team is on standby if you need any help or have questions or concerns. You can connect with us through the following channels:
Completed -
The scheduled maintenance has been completed.
Apr 18, 15:00 EDT
In progress -
Scheduled maintenance is currently in progress. We will provide updates as necessary.
Apr 18, 09:00 EDT
Scheduled -
Liquidweb Data Center Engineers will be performing scheduled maintenance on a power infrastructure module within the DC2 data center. This maintenance is being carried out to improve system reliability and help prevent potential equipment issues or service disruptions in the future.
No customer service disruption is expected during this maintenance window.
The system will be continuously monitored throughout the maintenance by the Liquidweb Infrastructure team to ensure safe and proper operation at all times.
Our support team will be on standby should you have any questions or concerns. You can reach us via: