Smartermail

3 CVEs product

Monthly

CVE-2026-25067 MEDIUM This Month

SmarterMail before build 9518 allows unauthenticated attackers to exploit a path traversal flaw in the background preview endpoint by supplying base64-encoded UNC paths, forcing the Windows service to initiate SMB connections to attacker-controlled servers. This enables credential coercion and NTLM relay attacks without requiring authentication or user interaction. No patch is currently available for this vulnerability.

Windows Smartermail
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-24423 CRITICAL KEV THREAT Emergency

SmarterTools SmarterMail prior to build 9511 contains a second critical vulnerability (CVE-2026-24423) — an unauthenticated remote code execution flaw in the ConnectToHub API method. An attacker can redirect the SmarterMail server to connect to a malicious HTTP endpoint that serves OS commands for execution. KEV-listed with EPSS 29%, this is chainable with CVE-2026-23760 for complete server compromise.

RCE Command Injection Smartermail
NVD
CVSS 3.1
9.8
EPSS
29.3%
Threat
4.3
CVE-2026-23760 CRITICAL POC KEV THREAT Emergency

SmarterTools SmarterMail prior to build 9511 contains a critical authentication bypass in the password reset API (CVE-2026-23760) that allows unauthenticated attackers to reset system administrator passwords without verification. With EPSS 65% and KEV listing, this trivially exploitable vulnerability enables complete email server takeover, compromising all hosted mailboxes and organizational communications.

Authentication Bypass Smartermail
NVD
CVSS 3.1
9.8
EPSS
65.4%
Threat
6.9
CVE-2026-25067
EPSS 0% CVSS 5.3
MEDIUM This Month

SmarterMail before build 9518 allows unauthenticated attackers to exploit a path traversal flaw in the background preview endpoint by supplying base64-encoded UNC paths, forcing the Windows service to initiate SMB connections to attacker-controlled servers. This enables credential coercion and NTLM relay attacks without requiring authentication or user interaction. No patch is currently available for this vulnerability.

Windows Smartermail
NVD
CVE-2026-24423
EPSS 29% 4.3 CVSS 9.8
CRITICAL KEV THREAT Emergency

SmarterTools SmarterMail prior to build 9511 contains a second critical vulnerability (CVE-2026-24423) — an unauthenticated remote code execution flaw in the ConnectToHub API method. An attacker can redirect the SmarterMail server to connect to a malicious HTTP endpoint that serves OS commands for execution. KEV-listed with EPSS 29%, this is chainable with CVE-2026-23760 for complete server compromise.

RCE Command Injection Smartermail
NVD
CVE-2026-23760
EPSS 65% 6.9 CVSS 9.8
CRITICAL POC KEV THREAT Emergency

SmarterTools SmarterMail prior to build 9511 contains a critical authentication bypass in the password reset API (CVE-2026-23760) that allows unauthenticated attackers to reset system administrator passwords without verification. With EPSS 65% and KEV listing, this trivially exploitable vulnerability enables complete email server takeover, compromising all hosted mailboxes and organizational communications.

Authentication Bypass Smartermail
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy