TROYANOSYVIRUS
Retour aux CVEs

CVE-2026-23760

CRITICALCISA KEV
9.8

Description

SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance. NOTE: SmarterMail system administrator privileges grant the ability to execute operating system commands via built-in management functionality, effectively providing administrative (SYSTEM or root) access on the underlying host.

Details CVE

Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie1/22/2026
Derniere modification1/27/2026
Sourcekev
Observations honeypot0

CISA KEV

FournisseurSmarterTools
ProduitSmarterMail
Nom vulnerabiliteSmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability
Date ajout KEV2026-01-26
Date limite remediation2026-02-16
Utilise dans ransomwareKnown

Produits affectes

smartertools:smartermail

Faiblesses (CWE)

CWE-288

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.