Site icon Fix I.T. Phill – Your Go-To Tech Guru

cPanel May 2026 TSR: LiteSpeed User-End Plugin Patch Guide

cPanel May 2026 TSR SEC-73728 SEC-73755 LiteSpeed User-End plugin patch checklist

cPanel May 2026 TSR SEC-73728 SEC-73755 LiteSpeed User-End plugin patch checklist

May 20, 2026 update: cPanel & WHM administrators should treat the May 19/20 security update as urgent, especially if LiteSpeed Web Server integrations are installed. cPanel has published SEC-73728 and SEC-73755 support entries, and public hosting-provider/admin reports quote cPanel and LiteSpeed communications saying the LiteSpeed User-End cPanel Plugin is affected by an actively exploited privilege-escalation issue.

This is separate from the earlier May 2026 cPanel & WHM / WP2 security update guide and the earlier Copy Fail kernel patch issue. If your hosting stack runs cPanel, WHM, WP Toolkit/WP2, LiteSpeed, CloudLinux, or legacy cPanel branches, this is another patch-and-verify item for the same very rough month.

Public technical details are still limited. We are intentionally not publishing attack mechanics, request details, target paths, scanner material, or live exploitation notes. The defensive move is enough: update cPanel, confirm the patched build for your branch, remove or disable the LiteSpeed User-End cPanel Plugin if it remains present, turn off auto-install until a safe version is confirmed, and audit recent administrative activity.

What Is Affected

Why Hosting Providers Should Move Fast

A cPanel user-end plugin is a high-value target because it sits inside the shared-hosting control plane. Even when the vulnerable component is third-party, customers experience it as “the hosting panel.” If a plugin can cross a privilege boundary, one compromised account can become a server-level incident.

The risk is bigger on shared hosting, reseller hosting, student/dev systems, legacy cPanel branches, CloudLinux/CageFS fleets, and any server where many independent site owners can reach cPanel features. Treat this like a control-panel incident, not a normal WordPress plugin cleanup.

Immediate Patch Checklist

Safe Admin Commands

These are normal maintenance checks, not vulnerability validation steps:

/usr/local/cpanel/cpanel -V
grep '^CPANEL=' /etc/cpupdate.conf
/scripts/upcp --force

For the LiteSpeed user-end plugin, LiteSpeed documents the cPanel plugin management command under the WHM LiteSpeed plugin tooling. If your server has LiteSpeed installed and the user-end plugin still exists after the cPanel update, remove it and disable auto-install while you wait for a safe replacement build:

/usr/local/lsws/admin/misc/lscmctl cpanelplugin --uninstall
/usr/local/lsws/admin/misc/lscmctl cpanelplugin -autoinstall 0

If your environment uses a different LiteSpeed path, use the LiteSpeed WHM interface instead of guessing at paths. On managed hosting, ask the provider to confirm whether the user-end cPanel plugin was removed or disabled fleet-wide.

Post-Patch Verification

What To Tell Customers

Use plain language: “We applied the May 2026 cPanel & WHM security update and temporarily removed or disabled the LiteSpeed user-end cPanel integration while the vendor finalizes safe plugin guidance. This does not mean your WordPress LiteSpeed Cache plugin was removed. Website caching and server LiteSpeed service may continue normally, but the cPanel-side management shortcut may be unavailable until the fixed component is confirmed.”

Source Links

Bottom Line

Patch cPanel now, verify the branch, remove or disable the LiteSpeed User-End cPanel Plugin if it remains available, and keep an eye on cPanel and LiteSpeed for the fixed plugin path. May 2026 has already shown that hosting control-panel bugs move quickly from “scheduled patch” to “active incident.” Treat this one with that same urgency.

Exit mobile version