No advisories yet.
Solution
Installation of LiteSpeed WHM PlugIn 5.3.1.0 and cPanel 2.4.7. Though installation of WHM 5.2.10 and cPanel 2.4.5 and above mitigate most of the issues.
Workaround
No workaround given by the vendor.
Thu, 21 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Privilege Escalation via Redis API in LiteSpeed cPanel Plugin |
Thu, 21 May 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LiteSpeed User-End cPanel Plugin before 2.4.5 allows privilege escalation (possibly to root), as exploited in the wild in May 2026. LiteSpeed WHM Plugin (the parent plugin) is unaffected. Detection is best done via a command line of grep -rE "cpanel_jsonapi_func=redisAble" /var/cpanel/logs /usr/local/cpanel/logs/ 2>/dev/null in Bash. If you get no output, you have not been hit with exploitation of the vulnerability. If there is output, we recommend you examine the IP addresses in the list, determine if they are valid IP addresses, and if not, block them. To determine damage done, examine the system logs for use by the detected IP addresses. The issue is related to mishandling of Redis enable/disable features. | LiteSpeed User-End cPanel Plugin before 2.4.5 allows privilege escalation (possibly to root), as exploited in the wild in May 2026. Detection is best done via a command line of grep -rE "cpanel_jsonapi_func=redisAble" /var/cpanel/logs /usr/local/cpanel/logs/ 2>/dev/null in Bash. If you get no output, you have not been hit with exploitation of the vulnerability. If there is output, we recommend you examine the IP addresses in the list, determine if they are valid IP addresses, and if not, block them. To determine damage done, examine the system logs for use by the detected IP addresses. The issue is related to mishandling of Redis enable/disable features. The recommended minimum version is 2.4.7. |
Thu, 21 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 21 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Litespeed Technologies
Litespeed Technologies cpanel Plugin |
|
| Vendors & Products |
Litespeed Technologies
Litespeed Technologies cpanel Plugin |
Thu, 21 May 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Privilege Escalation via Redis API in LiteSpeed cPanel Plugin |
Thu, 21 May 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LiteSpeed User-End cPanel Plugin before 2.4.5 allows privilege escalation (possibly to root), as exploited in the wild in May 2026. LiteSpeed WHM Plugin (the parent plugin) is unaffected. Detection is best done via a command line of grep -rE "cpanel_jsonapi_func=redisAble" /var/cpanel/logs /usr/local/cpanel/logs/ 2>/dev/null in Bash. If you get no output, you have not been hit with exploitation of the vulnerability. If there is output, we recommend you examine the IP addresses in the list, determine if they are valid IP addresses, and if not, block them. To determine damage done, examine the system logs for use by the detected IP addresses. The issue is related to mishandling of Redis enable/disable features. | |
| Weaknesses | CWE-266 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-21T18:09:29.784Z
Reserved: 2026-05-21T00:38:03.845Z
Link: CVE-2026-48172
Updated: 2026-05-21T12:46:02.557Z
Status : Awaiting Analysis
Published: 2026-05-21T02:16:33.760
Modified: 2026-05-21T18:16:17.340
Link: CVE-2026-48172
No data.
OpenCVE Enrichment
Updated: 2026-05-21T19:00:14Z