CVE-2026-23760
Published: 22 January 2026
Description
SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An…
more
unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance. NOTE: SmarterMail system administrator privileges grant the ability to execute operating system commands via built-in management functionality, effectively providing administrative (SYSTEM or root) access on the underlying host.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the authentication bypass by requiring timely remediation of the specific flaw in the password reset API through patching to SmarterMail build 9511 or later.
Prohibits permitting sensitive actions without identification or authentication, such as anonymous requests to the force-reset-password endpoint for administrator accounts.
Ensures secure authenticator management with verification procedures for password resets, preventing unauthorized changes to administrator credentials.
Security SummaryAI
CVE-2026-23760 is an authentication bypass vulnerability (CWE-288) affecting SmarterTools SmarterMail versions prior to build 9511. The issue resides in the password reset API, specifically the force-reset-password endpoint, which allows anonymous requests without verifying the existing password or a reset token for system administrator accounts. This flaw enables attackers to reset admin credentials directly, leading to full administrative compromise of the SmarterMail instance. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility and lack of prerequisites.
An unauthenticated attacker can exploit this vulnerability remotely by supplying a target system administrator username and a new password to the force-reset-password endpoint. Successful exploitation grants full administrative privileges within SmarterMail, which includes the ability to execute operating system commands through built-in management functionality. This effectively provides administrative access (SYSTEM on Windows or root on Linux) to the underlying host, allowing arbitrary code execution, data exfiltration, persistence, and further lateral movement.
Advisories from vendors and researchers, including SmarterTools release notes, VulnCheck, WatchTowr Labs, and Code White, recommend upgrading to SmarterMail build 9511 or later, where the authentication checks have been implemented to prevent unauthorized resets. No workarounds are detailed beyond patching, emphasizing the need for immediate updates due to the anonymous exploitability.
This vulnerability appears in the CISA Known Exploited Vulnerabilities Catalog, indicating real-world exploitation by attackers, potentially leveraging decompilers for reverse engineering as noted in some analyses. Security practitioners should prioritize scanning for vulnerable SmarterMail instances and monitor for signs of admin account resets.
Details
- CWE(s)
- KEV Date Added
- 26 January 2026
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an unauthenticated authentication bypass in a public-facing webmail application's API endpoint, allowing remote attackers to reset admin credentials and gain full administrative access with OS command execution, directly enabling T1190: Exploit Public-Facing Application.