Arbitrary File Read in cPanel cpdavd Attachment Download Endpoints
CVE-2026-29205 is an arbitrary file read vulnerability in cPanel & WHM affecting the cpdavd attachment download endpoints. According to the provided content, the issue results from a combination of incorrect privileges management and insufficient path filtering. Because privileges are not correctly dropped and path validation is inadequate, a remote attacker can cause the affected endpoint to read arbitrary files from the server filesystem. The available context further indicates this can be exploited pre-authentication and that file access may occur with root-level privileges or impact.
Impact, mitigation & remediation
What it means. What to do now. For analysts and engineers who need to decide and keep moving.
Impact
What an attacker gets — and what they’ve been doing with it.
Mitigation
If you can’t patch tonight, do this now.
Remediation
Patch, then assume compromise.
Exploits
No public exploits tracked yet. Mallory keeps watching.
No public exploit code observed for this vulnerability.
Affected products & vendors
Products and vendors Mallory has correlated with this vulnerability. Open in Mallory to drill down to specific CPE configurations and version ranges.
Vendor-confirmed product mapping. Mallory continuously reconciles against your asset inventory in the product.
Recent activity
22 sources tracked across advisories, community write-ups, and news. Mallory keeps watching after this page renders.
A pre-auth arbitrary file read vulnerability in cPanel that allows reading arbitrary files as root.
An arbitrary file read vulnerability in cPanel & WHM's cpdavd attachment download endpoints caused by incorrect privileges management and insufficient path filtering.
See the full picture, correlated to your attack surface.
Query your assets running an affected version, and investigate the blast radius.
Every observed campaign linking this CVE to a named adversary.
Malware families riding this exploit, with evidence and IOCs.
YARA, Sigma, Snort, and vendor rules — auto-deployed to your SIEM.
Cross-references every affected SKU, including bundled OEM variants.
Community discussion across Reddit, Mastodon, and other social sources.