×

    Get Demo

    Experience a live demo and discover how our solution can help you succeed.


    Server Status

    WebXion Server Status

    Last Updated: [1st May 2026 10:00 AM (IST)]
    Overall Status: Partial Systems Impacted Ongoing

    At WebXion, we continuously monitor all servers, websites, and infrastructure to ensure maximum uptime and performance. All necessary patches and security controls are getting revalidated by server team.

    This page provides real-time updates on any ongoing issues, maintenance, or incidents affecting services managed by WebXion.


    📊 Service Status
    ServiceStatus
    Web Hosting Servers🟠 Partial Impact
    Cloud Infrastructure🟢 Operational
    Client Websites🟠 Partial Impact
    Email Services🟢 Operational
    DNS Management🟢 Operational

    🔔 Incident & Maintenance Updates

    [30th April 2026] – [11:34 AM]

    Status: 🟠 Partial Impact
    Service Affected: Web Hosting Servers & Client Website

    Impact : As of late April 2026, cPanel & WHM is facing an exceptionally high level of cyber threat due to a critical, actively exploited authentication bypass vulnerability (CVE-2026-41940), with a CVSS score of 9.8. The flaw allows unauthenticated remote attackers to gain root-level access to the web hosting management system, placing millions of websites and servers at risk of complete compromise.


    Details:
    We are currently investigating intermittent slow response times affecting some hosted websites. Our engineering team is actively working to get necessary security patches implemented.

    6i3Bz4AAAAGSURBVAMAeaw2byQmzcAAAAAASUVORK5CYII=

    Global Impact Official NEWS :

    As of May 1, 2026, the level of cyber attack due to a critical cPanel vulnerability is extremely high, classified as a severe, active zero-day threat that allows remote, unauthenticated attackers to gain full administrative control over servers. 
     
    The vulnerability, tracked as CVE-2026-41940, has a maximum CVSS score of 9.8 (Critical), indicating that it is easily exploitable over a network without needing passwords. 
     
    Here is the situation breakdown as of today:
     
    🚨 Current Threat Status (As of May 1, 2026)
     
      • Widespread Impact: Around 1.5 million to over 2 million cPanel instances are estimated to be exposed to this risk, according to Shodan searches.
      • Full System Compromise: Attackers can gain root-level access to the WebHost Manager (WHM) or cPanel interface, allowing them to:
          • Steal customer data and databases.
          • Install backdoors, web shells, or ransomware.
          • Modify or delete websites and email accounts.

     
     

    Disclaimer: This information is based on security alerts published through April 30, 2026.
     
     

    [29th April 2026] – [10:34 PM]

    Status: 🟢 Operational
    Service Affected: No Impact

    Details:
    All applications and servers are running smoothly. No business impact detected.


    [20th April 2026] – [10:00 PM]

    Status: 🟢 Operational
    Service Affected: No Impact

    Details:
    All applications and servers are running smoothly. No business impact detected.


    [10th April 2026] – [11:00 PM]

    Status: 🟢 Operational
    Service Affected: No Impact

    Details:
    All applications and servers are running smoothly. No business impact detected.


    📌 Status Legend
    • 🟢 Operational – No issues

    • 🔵 Monitoring – Fix applied, observing stability

    • 🟡 Investigating – Issue detected, under investigation

    • 🟠 Identified – Root cause found, working on fix

    • 🔴 Major Outage – Significant service disruption


    📞 Need Help?

    If you are experiencing issues not listed here, please contact our support team:

    Chat With Us
    Hi! How can I help you?