CVE-2026-23760
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-22

Last updated on: 2026-01-27

Assigner: VulnCheck

Description
SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance. NOTE:Β SmarterMail system administrator privileges grant the ability to execute operating system commands via built-in management functionality, effectively providing administrative (SYSTEM or root) access on the underlying host.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-22
Last Modified
2026-01-27
Generated
2026-05-07
AI Q&A
2026-01-22
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
smartertools smartermail to 100.0.9511 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-288 The product requires authentication, but the product has an alternate path or channel that does not require authentication.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows unauthenticated attackers to gain full administrative access to SmarterMail instances by bypassing authentication in the password reset API. Such a compromise can lead to unauthorized access to sensitive personal and health information stored or processed by the mail server, potentially resulting in violations of data protection regulations like GDPR and HIPAA. The full administrative compromise and potential for remote code execution increase the risk of data breaches, unauthorized data modification, and loss of data integrity and availability, all of which negatively impact compliance with these standards. Immediate patching is critical to mitigate these risks. [1, 2]


Can you explain this vulnerability to me?

CVE-2026-23760 is a critical authentication bypass vulnerability in SmarterTools SmarterMail versions prior to build 9511. The flaw exists in the password reset API's force-reset-password endpoint, which allows anonymous requests without verifying the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can submit a target administrator username and a new password to reset the account password, resulting in full administrative access to the SmarterMail instance. [1, 2]


How can this vulnerability impact me? :

This vulnerability allows an unauthenticated attacker to reset the password of any system administrator account without verification, leading to full administrative compromise of the SmarterMail server. Once administrative access is gained, the attacker can execute arbitrary operating system commands with SYSTEM-level privileges via SmarterMail's features, resulting in complete system compromise including remote code execution (RCE). This can lead to data breaches, service disruption, and unauthorized control over the affected system. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for unauthorized POST requests to the `/api/v1/auth/force-reset-password` endpoint, especially those containing JSON payloads with `IsSysAdmin: true` and administrator usernames. A proof of concept involves sending such a POST request with a new password to reset the admin account without authentication. Network intrusion detection systems (NIDS) or web application firewalls (WAF) can be configured to alert on such suspicious requests. For manual detection, you can use tools like curl to test the endpoint (on a non-production system) or check web server logs for POST requests to this endpoint with suspicious payloads. Example curl command to test (do not run on production without authorization): ``` curl -X POST https://<smartermail-server>/api/v1/auth/force-reset-password \ -H "Content-Type: application/json" \ -d '{"IsSysAdmin":true,"Username":"admin","NewPassword":"NewPass123!","ConfirmPassword":"NewPass123!"}' ``` If the response indicates success without authentication, the system is vulnerable. [2]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade SmarterMail to build 9511 or later, as this patch enforces validation of the old password before allowing a password reset for administrator accounts. This update was released on January 15, 2026, and addresses the authentication bypass vulnerability. Additionally, restrict access to the password reset API endpoint if possible, monitor logs for suspicious activity targeting this endpoint, and apply network-level protections such as firewall rules or WAF policies to block unauthorized requests. Prompt patching is critical due to confirmed active exploitation shortly after the patch release. [2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart