🔐 CVE Alert

CVE-2026-23760

UNKNOWN 0.0 ⚠️ CISA KEV

SmarterTools SmarterMail < Build 9511 Authentication Bypass via Password Reset API

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance. NOTE: SmarterMail system administrator privileges grant the ability to execute operating system commands via built-in management functionality, effectively providing administrative (SYSTEM or root) access on the underlying host.

CWE CWE-288
Vendor smartertools
Product smartermail
Published Jan 22, 2026
Last Updated Mar 5, 2026
⚠️ Actively Exploited — Act Now

Get instant alerts for smartertools smartermail

This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2026-23760.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

SmarterTools / SmarterMail
0 < 100.0.9511

References

NVD ↗ CVE.org ↗ EPSS Data ↗
smartertools.com: https://www.smartertools.com/smartermail/release-notes/current labs.watchtowr.com: https://labs.watchtowr.com/attackers-with-decompilers-strike-again-smartertools-smartermail-wt-2026-0001-auth-bypass/ code-white.com: https://code-white.com/public-vulnerability-list/#authenticationserviceforceresetpassword-missing-authentication-in-smartermail vulncheck.com: https://www.vulncheck.com/advisories/smartertools-smartermail-authentication-bypass-via-password-reset-api huntress.com: https://www.huntress.com/blog/smartermail-account-takeover-leading-to-rce cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-23760

Credits

Piotr Bazydlo & Sina Kheirkhah of watchTowr Markus Wulftange of CODE WHITE GmbH