All Systems Operational

MONTREAL DATA CENTRE Operational
TORONTO DATA CENTRE Operational
VANCOUVER DATA CENTRE Operational
EMAIL SERVERS Operational
DEV/SANDBOX SERVERS Operational
BACKUP SYSTEMS Operational
STAGING SITE SYSTEM Operational
CDN Operational
MANAGED DNS Operational
WPCLOUD SUPPORT SYSTEM PORTAL Operational
WPCLOUD.CA WEBSITE Operational
3RD PARTY COURTESY NOTICES Operational
WPCloud Status Page Provider Operational
Operational
Degraded Performance
Partial Outage
Major Outage
Maintenance
May 13, 2026

No incidents reported today.

May 12, 2026

No incidents reported.

May 11, 2026

No incidents reported.

May 10, 2026

No incidents reported.

May 9, 2026

No incidents reported.

May 8, 2026
Completed - The scheduled maintenance has been completed.
May 8, 14:00 EDT
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
May 8, 12:00 EDT
Scheduled - cPanel has released a critical security update addressing multiple new vulnerabilities (CVE-2026-29201, CVE-2026-29202, CVE-2026-29203) that affect all supported versions. To protect customer environments, we are deploying this patch across our entire server fleet beginning at 12:00 PM EST today.

During this maintenance window, brief interruptions to cPanel access are expected as each server completes its update. Hosted websites and databases will continue to serve traffic normally throughout the rollout. Each individual server update typically completes within a few minutes, and we are coordinating the deployment server-by-server to minimize impact.

A final update will be posted here once all servers have been patched and verified.

May 8, 09:01 EDT
May 7, 2026

No incidents reported.

May 6, 2026

No incidents reported.

May 5, 2026

No incidents reported.

May 4, 2026

No incidents reported.

May 3, 2026

No incidents reported.

May 2, 2026

No incidents reported.

May 1, 2026
Completed - The scheduled maintenance has been completed.
May 1, 09:40 EDT
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
May 1, 07:40 EDT
Scheduled - Critical Security Mitigation

We are performing brief server reboots across our fleet to apply a vendor-recommended kernel-level mitigation for CVE-2026-31431 ("Copy Fail"), a high-severity Linux kernel vulnerability disclosed publicly on April 29, 2026. This vulnerability affects virtually all Linux distributions and allows local privilege escalation. Multi-tenant hosting environments are specifically identified as high-risk.

To be clear: we have no evidence of any exploitation or unauthorized access on our infrastructure. We are applying this mitigation proactively to ensure it stays that way.

Our existing security layers, including Imunify360 and CageFS, provide detection and containment, but the vendor (CloudLinux) has confirmed that the kernel-level mitigation is required to fully close the attack surface. Rather than wait for a live patch that may take additional hours to become available, we are applying the mitigation now to minimize our customers' exposure window.

Servers will be rebooted individually over the course of the maintenance window. Expected downtime is approximately 5-10 minutes per server.

No customer action is required. All websites and databases will resume automatically after each reboot. If you experience any issues following the maintenance window, please open a support ticket and our team will respond immediately.

We appreciate your understanding. Protecting our customers' data is our top priority.

May 1, 07:39 EDT
Apr 30, 2026
Completed - The scheduled maintenance has been completed.
Apr 30, 23:13 EDT
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Apr 30, 20:13 EDT
Scheduled - Critical Security Mitigation

We are performing brief server reboots across our fleet to apply a vendor-recommended kernel-level mitigation for CVE-2026-31431 ("Copy Fail"), a high-severity Linux kernel vulnerability disclosed publicly on April 29, 2026. This vulnerability affects virtually all Linux distributions and allows local privilege escalation. Multi-tenant hosting environments are specifically identified as high-risk.

To be clear: we have no evidence of any exploitation or unauthorized access on our infrastructure. We are applying this mitigation proactively to ensure it stays that way.

Our existing security layers, including Imunify360 and CageFS, provide detection and containment, but the vendor (CloudLinux) has confirmed that the kernel-level mitigation is required to fully close the attack surface. Rather than wait for a live patch that may take additional hours to become available, we are applying the mitigation now to minimize our customers' exposure window.

Servers will be rebooted individually over the course of the maintenance window. Expected downtime is approximately 5-10 minutes per server.

No customer action is required. All websites and databases will resume automatically after each reboot. If you experience any issues following the maintenance window, please open a support ticket and our team will respond immediately.

We appreciate your understanding. Protecting our customers' data is our top priority.

Apr 30, 20:12 EDT
Completed - The scheduled maintenance has been completed.
Apr 30, 05:00 EDT
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Apr 30, 04:00 EDT
Scheduled - Scheduled for: Thursday, April 30, 2026, 4:00 AM to 5:00 AM EDT (08:00 to 09:00 UTC)
Expected duration: Up to 1 hour

Summary

As part of our ongoing infrastructure improvement programme, we will be migrating our rathtrevor hosting cluster to new hardware. This work is being carried out during our standard off-peak maintenance window to minimise customer impact.

What to expect

The maintenance will take place in two phases:

1. cPanel migration (approx. 15 minutes): Accounts will be transferred to the new hardware. No downtime is expected during this phase.

2. IP address transition (approx. 25 minutes): IP addresses will be moved to the new cluster. Sites on rathtrevor will experience a short outage during this window.

We have allocated up to one hour in total to complete all work and verification.

Customer impact

If your site is hosted on the rathtrevor cluster, you will experience a brief interruption during the IP transition phase. No action is required on your part. All services will resume automatically once the transition is complete.

Apr 28, 19:26 EDT
Apr 29, 2026

No incidents reported.