TROYANOSYVIRUS
Back to CVEs

CVE-2026-23760

CRITICALCISA KEV
9.8

Description

SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance. NOTE: SmarterMail system administrator privileges grant the ability to execute operating system commands via built-in management functionality, effectively providing administrative (SYSTEM or root) access on the underlying host.

CVE Details

CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published1/22/2026
Last Modified1/27/2026
Sourcekev
Honeypot Sightings0

CISA KEV

VendorSmarterTools
ProductSmarterMail
Vulnerability NameSmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability
KEV Date Added2026-01-26
Remediation Due Date2026-02-16
Ransomware UseKnown

Affected Products

smartertools:smartermail

Weaknesses (CWE)

CWE-288

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.