
Need help with Contabo VPS Issues
- or -
Post a project like this29
£30(approx. $41)
- Posted:
- Proposals: 9
- Remote
- #4493950
- Open for Proposals
PPH TOP Web Developer | Digital Marketing (SEO, Social Media Management, Facebook/Instagram Ads, Google Ads)|WordPress, Shopify, Wix, e-commerce, | Video Editing

I Will Grow Your Business & Generate Leads with SEO, AI Automation, Video Content, Web Development & Strategy
12+ Yrs Full-Stack Dev | React, Node.js, PHP, WordPress, Golang, HTML5/CSS3 | AI, LLMs, ChatGPT, Web3 | PowerApps, AR/VR, Flutter, iOS/Android, macOS | Magento, Joomla, W3C, WooCommerce

Linux System Administrator | MySQL and MariaDB Database Administrator
198242713330178121735401338868081005913158115694986325386410952
Description
Experience Level: Entry
Need help with the following for Contabo VPS -
Preserve any needed data. If you do not have a backup listed in your Customer Control Panel, boot into the Rescue System to copy off any still-accessible files: https://help.contabo.com/en/support/solutions/articles/103000295053-how-do-i-boot-a-rescue-system-. Treat extracted files as potentially tampered with and review them carefully before reuse.
Reinstall the server from scratch via your Customer Control Panel to a clean OS image. This is the only reliable way to remove backdoors left by the attacker.
If (and only if) you hold a clean backup in the Customer Control Panel and choose to restore it, you must immediately log in via SSH and run /scripts/upcp --force to apply the security patch - otherwise the server will be re-infected within minutes.
Apply the patch on the clean installation following the recommended procedure:
Update cPanel & WHM to the latest available version.
Fully update all OS packages.
Verify that WHM is running one of the recommended versions, as per the article below.
Support article for reference: https://support.cpanel.net/hc/en-us/articles/40073787579671-Security-CVE-2026-41940-cPanel-WHM-WP2-Security-Update-04-28-2026
Change all credentials (WHM/cPanel accounts, SSH keys, API tokens, database users, email accounts) once the clean system is patched.
Preserve any needed data. If you do not have a backup listed in your Customer Control Panel, boot into the Rescue System to copy off any still-accessible files: https://help.contabo.com/en/support/solutions/articles/103000295053-how-do-i-boot-a-rescue-system-. Treat extracted files as potentially tampered with and review them carefully before reuse.
Reinstall the server from scratch via your Customer Control Panel to a clean OS image. This is the only reliable way to remove backdoors left by the attacker.
If (and only if) you hold a clean backup in the Customer Control Panel and choose to restore it, you must immediately log in via SSH and run /scripts/upcp --force to apply the security patch - otherwise the server will be re-infected within minutes.
Apply the patch on the clean installation following the recommended procedure:
Update cPanel & WHM to the latest available version.
Fully update all OS packages.
Verify that WHM is running one of the recommended versions, as per the article below.
Support article for reference: https://support.cpanel.net/hc/en-us/articles/40073787579671-Security-CVE-2026-41940-cPanel-WHM-WP2-Security-Update-04-28-2026
Change all credentials (WHM/cPanel accounts, SSH keys, API tokens, database users, email accounts) once the clean system is patched.
Ady B.
100% (2)Projects Completed
3
Freelancers worked with
2
Projects awarded
0%
Last project
28 Jun 2021
United Kingdom
New Proposal
Login to your account and send a proposal now to get this project.
Log inClarification Board Ask a Question
-

Hi, do you have a backup or does it need backing up first?
-

can you please tell if you currently have root SSH access and a clean backup available in the Contabo Customer Control Panel?
11540051153995
We collect cookies to enable the proper functioning and security of our website, and to enhance your experience. By clicking on 'Accept All Cookies', you consent to the use of these cookies. You can change your 'Cookies Settings' at any time. For more information, please read ourCookie Policy
Cookie Settings
Accept All Cookies