Update - Our teams are nearing the completion of the W3 Total Cache (W3TC) plugin update rollout across all eligible sites. The majority of sites running vulnerable or outdated versions have already been successfully updated.

We are now finalizing reviews on the remaining sites where updates could not be automatically applied. In these cases, customer involvement may be required (for example, due to outdated PHP or WordPress versions, or access limitations). We will reach out directly to affected customers to review their hosting environment and update the plugin.

We continue to recommend that all customers review their sites and manually update the W3TC plugin to version 2.8.14 or higher, if it has not already been updated, as exploit details are now publicly available.

We’ll share a final update once this process is fully complete.

If you have any questions or concerns, please don't hesitate to contact our support team through a ticket in your portal or via live chat.

Dec 18, 2025 - 08:59 EST
Update - As shared in our earlier update, our teams are continuing to roll out the W3 Total Cache (W3TC) plugin update on sites that meet the minimum requirements. We’ve already been able to successfully update many sites running vulnerable or outdated versions, and this work is still in progress across the fleet.

We’re also reviewing the remaining sites to determine where the update can be safely applied. In some cases, factors like outdated PHP/WordPress versions or limited server access may prevent the update from completing. For those situations, we will follow up directly with customers once our review is finished.

We still strongly encourage all customers to review their sites and manually update the W3TC plugin if needed, as details about the exploit have already been made public.

Further updates will be shared as progress continues.

Dec 10, 2025 - 15:10 EST
Update - We have successfully applied the W3 Total Cache (W3TC) plugin update to thousands of customer sites where an outdated installation was identified and the environment met the minimum requirements for the upgrade. Our teams are continuing to review the hosting fleet and will apply updates wherever possible.

In most cases, we are able to complete the update for our customers. However, several common blockers have prevented updates on some sites, including:

Outdated PHP versions (older than PHP 7.2.5)

Outdated WordPress installations (earlier than WordPress 5.3)

Restricted or limited server access

Once our update efforts are complete, we will contact customers whose environments contain a vulnerable W3TC installation that we were able to identify but could not be updated automatically, so that they and their teams can take any required remediation steps.

We strongly recommend that all customers review their hosting environments and update the plugin as soon as possible, as a proof-of-concept for the exploit has been publicly released.

Dec 02, 2025 - 16:17 EST
Update - Our team is actively involved in updating the W3 Total Cache (W3TC) plugin to the latest version for all sites running W3TC version 2.8.13 or earlier, as part of the ongoing remediation for CVE-2025-9501.

We are closely monitoring all systems throughout this process to ensure the updates are applied successfully and to verify that there is no customer impact.

Further updates will be shared as progress continues.

Nov 21, 2025 - 08:04 EST
Identified - Our team will be updating the W3 Total Cache (W3TC) plugin on WordPress sites where the installed version is lower than 2.8.13. This update addresses CVE-2025-9501, a critical security vulnerability.

A fixed version is available in W3TC 2.8.13 and later. To ensure the continued security and stability of your sites, our engineering team will apply this update.

We do not anticipate any downtime during this process.

No action is required on your part. Our team will monitor the update closely to ensure your sites remain fully functional. We appreciate your co-operation as we take this proactive step to protect your sites.

For additional details on the Vulnerability, please refer:
https://wpscan.com/vulnerability/6697a2c9-63ae-42f0-8931-f2e5d67d45ae/

If you encounter any issues after the update please contact our support team through a ticket in your portal or via live chat.

We will provide updates on the progress of the patching.

Nov 20, 2025 - 14:50 EST
Investigating - We are aware of an increase in email delivery issues affecting messages sent from Microsoft 365/Outlook to Premium Business email-hosted mailboxes. Some emails may bounce or be delayed due to Microsoft IP addresses appearing on the SenderScore blocklist.

If you are experiencing this issue, you can resolve it by safelisting Microsoft's sending IP addresses at the mailbox level:
1. Go to cp.rackspace.com > Domains > Spam settings > Safelists
2. Select your domain
3. Add the following IP ranges:
52.102.%.%
40.107.%.%
52.101.%.%
52.103.%.%

We are actively working with our partners to determine if fleet-wide mitigations can be applied. We will provide updates as more information becomes available.

If you have any questions or concerns, please don't hesitate to contact us via Live Chat or by opening a case.

Dec 16, 2025 - 17:16 EST
API Operational
DNS Operational
Cloud Dedicated Operational
Cloud VPS Hosting Operational
CPanel Operational
InterWorx Operational
Plesk Operational
Object Storage Operational
VMware Cloud Operational
VMware Private Cloud Operational
Business Email Operational
Load Balancers Operational
Cloud Load Balancers Operational
Shared Load Balancers - DC2 Operational
Shared Load Balancers - DC3 Operational
Shared Load Balancers - DC4 Operational
Shared Load Balancers - DC5 Operational
Network Operational
LAN Network Operational
PHX Network Operational
AMS Network Operational
Data Centers Operational
DC2 - LAN Operational
DC3 - LAN Operational
DC4 - PHX Operational
EU - AMS Operational
Management Portal Operational
Support Services Operational
Chat Operational
Case Operational
Phone Operational
Operational
Degraded Performance
Partial Outage
Major Outage
Maintenance

Scheduled Maintenance

Scheduled Network Maintenance, DC2 and DC3 Jan 3, 2026 21:00-22:00 EST

We will be performing scheduled network maintenance to apply updates that enhance the long-term performance, stability, and security of our infrastructure. During this window, our teams will also complete validation and testing to ensure all recent changes continue to operate as expected across our data center network systems.

No customer impact is expected during this maintenance period. All work is being performed under strict change controls and will be closely monitored by our engineering teams to ensure a smooth and seamless experience.

We appreciate your patience and understanding. If you need any assistance, our Support Team is available 24/7 via Live Chat or at support@liquidweb.com

Posted on Dec 05, 2025 - 12:25 EST
Dec 19, 2025

No incidents reported today.

Dec 18, 2025
Resolved - This incident has been resolved.
Dec 18, 17:50 EST
Monitoring - The engineering team has successfully completed the necessary maintenance, and full access to the VMware Cloud Director portal has been restored.


All management portal functionalities are now fully operational.

We are continuing to monitor the environment to ensure sustained stability.

As noted throughout the incident, all virtual server workloads remained unaffected and fully operational during this period.

Dec 18, 15:41 EST
Identified - We have successfully identified the root cause of the 503 errors affecting access to the VMware Cloud Director portal. Our engineering team is currently applying a fix to restore full access.

Portal Access: Users may continue to experience 503 errors when attempting to log in to the management interface.

Server Stability: All existing virtual servers and workloads hosted on VMware remain fully operational and unaffected. This issue is strictly limited to the management portal interface.

We will provide another update as soon as the fix has been fully implemented and verified.

Dec 18, 15:20 EST
Investigating - We are currently investigating an issue where the VMware Cloud Director portal is returning a 503 error, making it temporarily inaccessible. Our engineering team is actively working to restore service as quickly as possible.

We understand the importance of this tool to your operations and will provide regular updates as we move toward a resolution.

Dec 18, 14:11 EST
Dec 17, 2025

No incidents reported.

Dec 16, 2025
Resolved - This incident has been resolved.
Dec 16, 16:59 EST
Update - While progress has been made, the issue is not yet fully resolved on all affected servers.

Our engineering team has identified the underlying cause as a hardlink tied to a legacy EL7 hard-coded repository, most commonly present on servers that were upgraded from EL7 to AlmaLinux 8.

The team is actively validating a scalable, long-term fix to address this behavior consistently across impacted systems. In the meantime, we are continuing targeted remediation where needed and closely monitoring results.

Further updates will be shared as progress continues.

Dec 15, 11:49 EST
Identified - Our team is actively working on automating remediation steps related to the AlmaLinux 8 repository configuration associated with Issue #1 (servers upgraded in-place from CentOS 7 to AlmaLinux 8 using the cPanel Elevate process). This effort is intended to ensure consistent configuration for that group.

Regarding Issue #2, our investigation indicates this scenario affects a much smaller subset of clients, primarily servers where dovecot-solr was installed prior to the cPanel v132 release. At this time, we are not seeing widespread impact related to this condition.

If you believe your server may be affected by either issue, or if you are experiencing email-related disruptions such as IMAP/POP3 connectivity problems or Dovecot reporting as down, please contact our support team by opening a ticket or starting a live chat so we can review and address the issue on your server.

Dec 12, 12:00 EST
Investigating - We are currently investigating an issue where a recent cPanel update is causing the Dovecot service to crash and fail to properly restart on a specific subset of servers.

This service interruption can result in connectivity problems with IMAP and POP3 and may affect mail sending from the server.

Not all cPanel servers are impacted. We have identified that the issue primarily affects servers that meet one of the following criteria:


1. Servers that have performed an in-place OS upgrade from CentOS 7 to AlmaLinux 8 using the cPanel Elevate script.
https://support.cpanel.net/hc/en-us/articles/36882183127959-Socket-file-usr-local-cpanel-var-cpdoveauth-domainownerd-sock-incorrectly-set-in-etc-dovecot-dovecot-conf


2. Servers running AlmaLinux 8 and cPanel that had the dovecot-solr service installed prior to the cPanel version 132 release.
https://support.cpanel.net/hc/en-us/articles/36830044341655-Dovecot-not-starting-when-dovecot-solr-is-installed-cPanel-version-132

cPanel has released documentation and provided remediation steps for these issues.

If you are currently experiencing issues with Dovecot reporting down, please open a support ticket via our help center portal or open a chat with our support team so our team can address the issue on your server.

Dec 11, 13:39 EST
Dec 15, 2025
Resolved - The patching process has been completed, and our engineers have successfully updated all remaining affected systems. All updates were applied with minimal, expected interruptions.

Thank you for your patience and understanding while we worked through this event. If you experience any issues or need assistance, please contact our Support Team via Live Chat or by opening a Support Case.

Thank you, the Liquidweb Team.

Dec 15, 15:39 EST
Update - We sincerely appreciate your continued cooperation throughout the firewall upgrade initiative. Significant progress has been made so far, and our teams remain fully focused on planning and completing the remaining upgrades as efficiently and smoothly as possible.

For those clients we have not yet heard back from, we are now moving forward with scheduling the remaining firewall replacements. Our team is reviewing availability and coordinating the final windows to ensure minimal impact wherever possible. You will be contacted soon with the confirmed date and time for your specific upgrade.

Thank you again for your partnership and patience as we work to complete this critical improvement.

Dec 1, 10:33 EST
Update - We sincerely appreciate your ongoing cooperation in coordinating firewall upgrades with our team. Significant progress is being made across this initiative, and our teams remain focused on completing the remaining upgrades as efficiently and effectively as possible.

All affected clients have been contacted, and many of the firewall replacements have now been completed. For the few pending replacements, we are waiting for the scheduling confirmation from the remaining clients.

For any clients we do not hear from, we will proactively coordinate a replacement window and notify you once it is scheduled.

We thank you for your continued partnership as we finalize this critical infrastructure upgrade.

Nov 20, 12:34 EST
Update - We sincerely appreciate the continued cooperation from all clients in scheduling their firewall upgrades with our team.

We are making strong and consistent progress across this initiative. Our teams are diligently working to complete the remaining upgrades as effectively and efficiently as possible.

We will continue to proactively reach out to affected clients to schedule their 2-hour replacement window once their new hardware is prepped.

Thank you for your ongoing partnership as we complete this critical infrastructure upgrade.

Nov 18, 09:46 EST
Update - We’d like to thank our clients who have scheduled their firewall replacements with our team. Coordination and replacements for end of life firewalls have started smoothly in this next phase, and we appreciate the timely responses that have helped keep this process on track.

We will continue to reach out to affected clients once a firewall is prepped and ready for replacement. As we continue with the remaining replacements, clients are encouraged to coordinate directly with our Support Team through their ticket once a new firewall is ready to go for their account. This will be an approximate 2 hour window of down time.

We appreciate your continued partnership and cooperation as we complete this important upgrade initiative. Further updates will be shared here as progress continues.

Nov 11, 08:56 EST
Update - Our networking and data center teams continue to work on firewall replacements for clients who are on end of life hardware. Clients affected by this next step should check their customer portal for a notification ticket regarding the required firewall upgrade. Please coordinate in the ticket a window of time where our teams can perform the hardware replacement and upgrade. This will be an approximate 2 hour window of down time.

This upgrade is part of our ongoing efforts to ensure your infrastructure remains secure and fully supported.

We appreciate your continued cooperation and understanding as we complete this important maintenance initiative. Further updates will be provided here as work continues.

Nov 10, 13:05 EST
Update - Our Network Team has completed the patching and upgrade phase for client firewalls. All systems have been updated as planned; however, a small number of firewalls that have reached end-of-life status will need to be replaced.

Clients affected by this next step should check their customer portal for a notification regarding the required firewall upgrade. This upgrade is part of our ongoing efforts to ensure your infrastructure remains secure and fully supported.

We appreciate your continued cooperation and understanding as we complete this important maintenance initiative. Further updates will be provided here as work continues.

Nov 8, 19:16 EST
Update - As a quick update - our team has been working round the clock on the patching process, and we're seeing tremendous progress so far. Everything we patched so far has gone smoothly, with only minimal interruptions, to ensure all machines are patched and updated successfully.

If you have a hardware firewall, please take a moment to check your customer portal for any maintenance ticket notifications. We'll be reaching out to each client directly before starting their maintenance.

Should you notice any issues following your upgrade or have any questions, please don't hesitate to get in touch with our Support team - we'll be happy to help. Most updates are still expected to cause only brief interruptions of around 30 minutes or less, and high-availability firewall setups may see little to no downtime.

We truly appreciate your continued patience and understanding while we complete this important phase of the upgrades. We'll keep this space updated as we make further progress.

Nov 8, 02:54 EST
Update - Our Network Team has made significant progress in the current phase of client patching and upgrade work. Operations are proceeding smoothly.

As we move into the weekend, additional patching and upgrade work will continue. Clients with hardware firewalls should check their customer portal for any maintenance ticket notifications.

If you experience any issues following your upgrade, please reach out to our Support Team for assistance. Most updates are still expected to result in brief interruptions of 30 minutes or less. High-availability firewall configurations may see less downtime or possibly none.

We appreciate your continued patience and understanding as we complete this phase of the upgrades. Further updates will be shared here as our work progresses.

Nov 7, 19:31 EST
Update - Our Network Team has covered a great deal of ground as we continue progressing through the upgrade schedule. Updates and patching are being completed in cohorts to ensure a controlled and efficient roll out.

Clients with hardware firewalls should continue to check their customer portal for ticket notifications regarding scheduled maintenance.

We appreciate your continued patience and understanding as we work to complete these updates across all environments. Further updates will be posted here as progress continues.

Nov 7, 15:31 EST
Update - This work is still in progress, and our engineers continue to update the remaining affected systems.

Clients with hardware firewalls will continue receiving direct maintenance notifications via support tickets. Most updates are still expected to result in brief interruptions of 30 minutes or less.

We appreciate your continued patience as we work through the remaining updates. Further updates will be posted here as progress continues.

Nov 7, 12:00 EST
Update - Our Network Team has made strong progress on the ongoing network patching. This work will continue over the next few days as we complete updates across all systems.

Our engineers are working continuously to ensure the process is completed efficiently and with minimal impact. Clients with hardware firewalls will continue to receive direct maintenance notifications via support tickets. Most updates result in brief interruptions of 30 minutes or less.

We have high confidence that high-availability firewall configurations can be updated without downtime, however we may not be able to guarantee zero interruption.

We appreciate your patience and understanding as we complete this important upgrade. Further updates will be posted here as progress continues.

Nov 7, 09:46 EST
Update - Our Network Team will be installing security patches over the next few days to fully resolve this issue. Any clients with hardware firewalls that were affected will receive a ticket regarding an emergency maintenance. Security patching will result in down times of 30 minutes or less. High-availability firewall configurations can be patched without any downtime. Please check your customer portal for that notification.

We understand that up-time is critical, and we appreciate your cooperation as we take this proactive measure to protect your systems from potential threats.

We will keep this status page updated with our team's progress.

Nov 6, 20:24 EST
Monitoring - Our Liquid Web Networking team identified the the networking issue with our DC2 & DC3 data centers. Networking is currently back online.

We will continue to monitor the system to ensure stability.

Thank you for your continued patience.

Nov 5, 13:57 EST
Update - We are continuing to investigate this issue.
Nov 5, 12:03 EST
Investigating - Liquid Web Systems Engineers are currently investigating a networking issues in our DC2 & DC3 Data Center.

Liquid Web's Networking team have been engaged and are working to restore service as quickly as possible. We will provide further updates as soon as they become available.

Our support team is on standby if you need any help or have questions or concerns. If you have any questions or concerns, please contact a member of our support team via live-chat or ticket (support@liquidweb.com).

Nov 5, 12:02 EST
Dec 14, 2025

No incidents reported.

Dec 13, 2025

No incidents reported.

Dec 12, 2025
Dec 11, 2025
Dec 10, 2025
Dec 9, 2025

No incidents reported.

Dec 8, 2025

No incidents reported.

Dec 7, 2025

No incidents reported.

Dec 6, 2025

No incidents reported.

Dec 5, 2025
Resolved - Cloudflare has reverted the change to their Web Application Firewall that caused the brief network disruption earlier today. Since the rollback, we have not observed any further issues.

For more details about the incident, please refer to Cloudflare’s official post:
https://blog.cloudflare.com/5-december-2025-outage/

If you have any questions or concerns, please don't hesitate to contact us via Live Chat or by opening a case.

Dec 5, 11:41 EST
Update - A change made to the way Cloudflare’s Web Application Firewall parses requests caused Cloudflare’s network to be unavailable for several minutes this morning (ET hours). We are continuing to see stability, and we will keep this space updated as we receive further information from the Cloudflare team.
Dec 5, 04:58 EST
Monitoring - Cloudflare team has implemented a fix and resolved the issue. We are monitoring the results.
Dec 5, 04:29 EST
Update - We are continuing to investigate this issue.
Dec 5, 04:19 EST
Investigating - Cloudflare is currently investigating issues affecting the Cloudflare Dashboard and related APIs.

Customers using the Dashboard or Cloudflare APIs may experience failed requests or see error messages.

We are monitoring the progress being made by the Cloudflare team and will keep this space updated.

Dec 5, 04:18 EST