
Digital Pacific Status
Real-time updates of Digital Pacific issues and outages
Digital Pacific status is Operational
Digital Pacific Personal and Business Hosting
Digital Pacific Reseller Hosting
Digital Pacific Dedicated Servers
Digital Pacific VPS Hosting
You're checking on Digital Pacific - but is your own site converting?
Outages aren't the only thing that costs you visitors.
Get a visual audit that shows exactly where your site loses conversions.
Free, takes 2 minutes.
Active Incidents
As part of the latest security advisories released by cPanel, customers using VPS and Dedicated Servers are strongly advised to ensure the following components are updated to the latest supported versions:
cPanel & WHM EasyApache packages Operating System Kernel
cPanel has released additional security patches and recommendations to further strengthen protection against recently disclosed vulnerabilities. Applying these updates at the earliest is recommended to help safeguard your server environment and avoid potential service impact.
Please refer to the official advisories below for more details: https://support.cpanel.net/hc/en-us/articles/40311543760407-Security-CVE-2026-29203-cPanel-WHM-WP2-Security-Update-May-08-2026 https://support.cpanel.net/hc/en-us/articles/40229402602519-Security-CVE-2026-23918 https://support.cpanel.net/hc/en-us/articles/40184022594071-CVE-2026-31431-copy-fail-reported-for-linux-kernels
For most customers, the patches have already been applied or are being rolled out automatically; however, customers using custom SSH ports or self-managed servers are advised to perform the recommended updates from their end.
We recommend performing these updates as soon as possible as a precautionary security measure. Thank you for your continued cooperation and understanding.
This incident is related to a recently identified security vulnerability in cPanel & WHM login. cPanel would release a new security patch tonight to fix all the identified vulnerabilities and we have planned to install the same on all our servers as soon as released.
For self-managed VPS and Dedicated Servers, we recommend running the force upcp script (cPanel version update script) after 12:30 PM EST.
Given the nature of this vulnerability, and our immediate priority is to secure data and prevent any impact, we are blocking certain access (WHM/cPanel/Webmail) temporarily, until further notice.
Your email functionality continues to work (IMAP/POP), we request to use email clients to access your emails in the meantime.
We will keep this post updated once we install the patch on respective servers. Thank you for your understanding and support.
Dear Customers,
A critical security vulnerability affecting cPanel & WHM login authentication has recently been identified by the vendor. This issue impacts all currently supported versions of cPanel and may expose servers to unauthorized access if left unpatched.
The good news is that cPanel has now released the official security patch for supported versions. We strongly recommend that all customers using VPS and Dedicated Servers; update to the latest cPanel version at the earliest to avoid any potential impact from this vulnerability.
Action Required: Please update cPanel to the latest version via WHM or from the server using the standard update process.
For guidance, please refer to the official documentation: https://docs.cpanel.net/whm/cpanel/upgrade-to-latest-version/
Important Notes:
No known service impact has been reported at this time. Servers with auto-updates enabled may already receive the patch automatically. Customers running older / unsupported cPanel versions are strongly advised to upgrade to a supported build immediately, as the vulnerability may also affect those versions.
We recommend applying this update as soon as possible as a precautionary security measure.
Recently Resolved Incidents
No recent incidents
Digital Pacific Outage Survival Guide
Digital Pacific Components
Digital Pacific Personal and Business Hosting
This incident is related to a recently identified security vulnerability in cPanel & WHM login. cPanel would release a new security patch tonight to fix all the identified vulnerabilities and we have planned to install the same on all our servers as soon as released.
For self-managed VPS and Dedicated Servers, we recommend running the force upcp script (cPanel version update script) after 12:30 PM EST.
Given the nature of this vulnerability, and our immediate priority is to secure data and prevent any impact, we are blocking certain access (WHM/cPanel/Webmail) temporarily, until further notice.
Your email functionality continues to work (IMAP/POP), we request to use email clients to access your emails in the meantime.
We will keep this post updated once we install the patch on respective servers. Thank you for your understanding and support.
Digital Pacific Reseller Hosting
This incident is related to a recently identified security vulnerability in cPanel & WHM login. cPanel would release a new security patch tonight to fix all the identified vulnerabilities and we have planned to install the same on all our servers as soon as released.
For self-managed VPS and Dedicated Servers, we recommend running the force upcp script (cPanel version update script) after 12:30 PM EST.
Given the nature of this vulnerability, and our immediate priority is to secure data and prevent any impact, we are blocking certain access (WHM/cPanel/Webmail) temporarily, until further notice.
Your email functionality continues to work (IMAP/POP), we request to use email clients to access your emails in the meantime.
We will keep this post updated once we install the patch on respective servers. Thank you for your understanding and support.
Digital Pacific Dedicated Servers
This incident is related to a recently identified security vulnerability in cPanel & WHM login. cPanel would release a new security patch tonight to fix all the identified vulnerabilities and we have planned to install the same on all our servers as soon as released.
For self-managed VPS and Dedicated Servers, we recommend running the force upcp script (cPanel version update script) after 12:30 PM EST.
Given the nature of this vulnerability, and our immediate priority is to secure data and prevent any impact, we are blocking certain access (WHM/cPanel/Webmail) temporarily, until further notice.
Your email functionality continues to work (IMAP/POP), we request to use email clients to access your emails in the meantime.
We will keep this post updated once we install the patch on respective servers. Thank you for your understanding and support.
As part of the latest security advisories released by cPanel, customers using VPS and Dedicated Servers are strongly advised to ensure the following components are updated to the latest supported versions:
cPanel & WHM EasyApache packages Operating System Kernel
cPanel has released additional security patches and recommendations to further strengthen protection against recently disclosed vulnerabilities. Applying these updates at the earliest is recommended to help safeguard your server environment and avoid potential service impact.
Please refer to the official advisories below for more details: https://support.cpanel.net/hc/en-us/articles/40311543760407-Security-CVE-2026-29203-cPanel-WHM-WP2-Security-Update-May-08-2026 https://support.cpanel.net/hc/en-us/articles/40229402602519-Security-CVE-2026-23918 https://support.cpanel.net/hc/en-us/articles/40184022594071-CVE-2026-31431-copy-fail-reported-for-linux-kernels
For most customers, the patches have already been applied or are being rolled out automatically; however, customers using custom SSH ports or self-managed servers are advised to perform the recommended updates from their end.
We recommend performing these updates as soon as possible as a precautionary security measure. Thank you for your continued cooperation and understanding.
Dear Customers,
A critical security vulnerability affecting cPanel & WHM login authentication has recently been identified by the vendor. This issue impacts all currently supported versions of cPanel and may expose servers to unauthorized access if left unpatched.
The good news is that cPanel has now released the official security patch for supported versions. We strongly recommend that all customers using VPS and Dedicated Servers; update to the latest cPanel version at the earliest to avoid any potential impact from this vulnerability.
Action Required: Please update cPanel to the latest version via WHM or from the server using the standard update process.
For guidance, please refer to the official documentation: https://docs.cpanel.net/whm/cpanel/upgrade-to-latest-version/
Important Notes:
No known service impact has been reported at this time. Servers with auto-updates enabled may already receive the patch automatically. Customers running older / unsupported cPanel versions are strongly advised to upgrade to a supported build immediately, as the vulnerability may also affect those versions.
We recommend applying this update as soon as possible as a precautionary security measure.
Digital Pacific VPS Hosting
This incident is related to a recently identified security vulnerability in cPanel & WHM login. cPanel would release a new security patch tonight to fix all the identified vulnerabilities and we have planned to install the same on all our servers as soon as released.
For self-managed VPS and Dedicated Servers, we recommend running the force upcp script (cPanel version update script) after 12:30 PM EST.
Given the nature of this vulnerability, and our immediate priority is to secure data and prevent any impact, we are blocking certain access (WHM/cPanel/Webmail) temporarily, until further notice.
Your email functionality continues to work (IMAP/POP), we request to use email clients to access your emails in the meantime.
We will keep this post updated once we install the patch on respective servers. Thank you for your understanding and support.
As part of the latest security advisories released by cPanel, customers using VPS and Dedicated Servers are strongly advised to ensure the following components are updated to the latest supported versions:
cPanel & WHM EasyApache packages Operating System Kernel
cPanel has released additional security patches and recommendations to further strengthen protection against recently disclosed vulnerabilities. Applying these updates at the earliest is recommended to help safeguard your server environment and avoid potential service impact.
Please refer to the official advisories below for more details: https://support.cpanel.net/hc/en-us/articles/40311543760407-Security-CVE-2026-29203-cPanel-WHM-WP2-Security-Update-May-08-2026 https://support.cpanel.net/hc/en-us/articles/40229402602519-Security-CVE-2026-23918 https://support.cpanel.net/hc/en-us/articles/40184022594071-CVE-2026-31431-copy-fail-reported-for-linux-kernels
For most customers, the patches have already been applied or are being rolled out automatically; however, customers using custom SSH ports or self-managed servers are advised to perform the recommended updates from their end.
We recommend performing these updates as soon as possible as a precautionary security measure. Thank you for your continued cooperation and understanding.
Dear Customers,
A critical security vulnerability affecting cPanel & WHM login authentication has recently been identified by the vendor. This issue impacts all currently supported versions of cPanel and may expose servers to unauthorized access if left unpatched.
The good news is that cPanel has now released the official security patch for supported versions. We strongly recommend that all customers using VPS and Dedicated Servers; update to the latest cPanel version at the earliest to avoid any potential impact from this vulnerability.
Action Required: Please update cPanel to the latest version via WHM or from the server using the standard update process.
For guidance, please refer to the official documentation: https://docs.cpanel.net/whm/cpanel/upgrade-to-latest-version/
Important Notes:
No known service impact has been reported at this time. Servers with auto-updates enabled may already receive the patch automatically. Customers running older / unsupported cPanel versions are strongly advised to upgrade to a supported build immediately, as the vulnerability may also affect those versions.
We recommend applying this update as soon as possible as a precautionary security measure.