Newsroom

EasyApache4 v25.19 Maintenance and Security Release

cPanel, L.L.C. has released an update for EasyApache 4!  Take a look at some highlights below, and then join us on the cPanel Community Forums, Discord, or Reddit to talk about this update and much more. If you have additional questions, feel free to reach out on one of our social channels.

  • ea-apache24-config
    • ZC-12882: Re-order traffic log IPs format to match actual use
    • ZC-12882: switch domlogs from %h to %a to take advantage of real-ip
  • ea-nginx
    • ZC-12882: Re-order traffic log IPs format to match actual use
  • ea-php83
    • EA-12917: Update ea-php83 from v8.3.21 to v8.3.22
  • ea-php83-meta
    • EA-12917: Update ea-php83 from v8.3.21 to v8.3.22
  • ea-php84
    • EA-12918: Update ea-php84 from v8.4.7 to v8.4.8
  • ea-php84-meta
    • EA-12918: Update ea-php84 from v8.4.7 to v8.4.8
  • ea-libcurl
    • EA-12914: Update ea-libcurl from v8.14.0 to v8.14.1
    • CVE-2025-5399: WebSocket endless loop
  • ea-libzip
    • EA-12888: Update ea-libzip from v1.11.2 to v1.11.4

SUMMARY

WebPros International, LLC has updated packages for EasyApache 4 with a updated version of libcurl. This release addresses vulnerabilities related to CVE-2025-5399. We strongly encourage all libcurl users to update to version 8.14.1.

AFFECTED VERSIONS
All versions of libcurl through 8.14.0.

SECURITY RATING
The National Vulnerability Database (NIST) has given the following severity ratings to these CVEs:

CVE-2025-5399 – LOW
libcurl 8.14.1
Fixed vulnerability related to CVE-2025-5399.

SOLUTION
WebPros International, LLC has released updated packages for EasyApache 4 25.19 on 2025 June 11, with libcurl version 8.14.1. Unless you have enabled automatic package updates in your cron, update your system with either your package manager or WHM’s Run System Update interface.

REFERENCES
https://www.cve.org/CVERecord?id=CVE-2025-5399
https://curl.se/ch/8.14.1.html

Information about all releases this year can be found in the 2025 EasyApache 4 Changelog.

You can follow our RSS feed for all our releases here: https://docs.cpanel.net/release-notes/release-notes/index.xml

GPG signed copy of this announcement: https://news.cpanel.com/wp-content/uploads/2025/06/EA4-25.19-CVE.signed.txt