SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance. NOTE: SmarterMail system administrator privileges grant the ability to execute operating system commands via built-in management functionality, effectively providing administrative (SYSTEM or root) access on the underlying host.
References
| Link | Resource |
|---|---|
| https://code-white.com/public-vulnerability-list/#authenticationserviceforceresetpassword-missing-authentication-in-smartermail | Third Party Advisory |
| https://labs.watchtowr.com/attackers-with-decompilers-strike-again-smartertools-smartermail-wt-2026-0001-auth-bypass/ | Exploit Third Party Advisory |
| https://www.smartertools.com/smartermail/release-notes/current | Release Notes |
| https://www.vulncheck.com/advisories/smartertools-smartermail-authentication-bypass-via-password-reset-api | Third Party Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-23760 | US Government Resource |
| https://www.huntress.com/blog/smartermail-account-takeover-leading-to-rce | Exploit Third Party Advisory |
Configurations
History
27 Jan 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CPE | cpe:2.3:a:smartertools:smartermail:*:*:*:*:*:*:*:* | |
| References | () https://code-white.com/public-vulnerability-list/#authenticationserviceforceresetpassword-missing-authentication-in-smartermail - Third Party Advisory | |
| References | () https://labs.watchtowr.com/attackers-with-decompilers-strike-again-smartertools-smartermail-wt-2026-0001-auth-bypass/ - Exploit, Third Party Advisory | |
| References | () https://www.smartertools.com/smartermail/release-notes/current - Release Notes | |
| References | () https://www.vulncheck.com/advisories/smartertools-smartermail-authentication-bypass-via-password-reset-api - Third Party Advisory | |
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-23760 - US Government Resource | |
| References | () https://www.huntress.com/blog/smartermail-account-takeover-leading-to-rce - Exploit, Third Party Advisory | |
| First Time |
Smartertools
Smartertools smartermail |
26 Jan 2026, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
23 Jan 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance. NOTE: SmarterMail system administrator privileges grant the ability to execute operating system commands via built-in management functionality, effectively providing administrative (SYSTEM or root) access on the underlying host. |
23 Jan 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
22 Jan 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-22 15:16
Updated : 2026-01-27 16:16
NVD link : CVE-2026-23760
Mitre link : CVE-2026-23760
CVE.ORG link : CVE-2026-23760
JSON object : View
Products Affected
smartertools
- smartermail
CWE
CWE-288
Authentication Bypass Using an Alternate Path or Channel
