CVE-2026-23760

9.8 CRITICAL CISA KEV

📋 TL;DR

CVE-2026-23760 is an authentication bypass vulnerability in SmarterMail's password reset API that allows unauthenticated attackers to reset administrator passwords. This leads to full administrative compromise of the email server, potentially granting SYSTEM/root access on the underlying host. All SmarterMail instances prior to build 9511 are affected.

💻 Affected Systems

Products:
  • SmarterTools SmarterMail
Versions: All versions prior to build 9511
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The vulnerability affects the web interface/API component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the SmarterMail instance leading to SYSTEM/root access on the host, data exfiltration, ransomware deployment, and lateral movement within the network.

🟠

Likely Case

Administrative takeover of the email server, access to all email accounts, and potential command execution on the underlying operating system.

🟢

If Mitigated

Limited impact if proper network segmentation, access controls, and monitoring are in place to detect and block exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP requests to the vulnerable endpoint with minimal technical knowledge. Multiple public exploit scripts and detailed analysis are available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 9511 or later

Vendor Advisory: https://www.smartertools.com/smartermail/release-notes/current

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download and install SmarterMail build 9511 or later from the official website. 3. Restart the SmarterMail service. 4. Verify the update was successful by checking the build number.

🔧 Temporary Workarounds

Network Access Control

all

Block external access to the SmarterMail web interface/API using firewall rules

Web Application Firewall

all

Implement WAF rules to block requests to the force-reset-password endpoint

🧯 If You Can't Patch

  • Isolate the SmarterMail server from the internet and restrict access to trusted internal networks only
  • Implement strict network monitoring and alerting for any password reset attempts on administrator accounts

🔍 How to Verify

Check if Vulnerable:

Check the SmarterMail build number in the web interface under Help > About. If the build number is lower than 9511, the system is vulnerable.

Check Version:

Not applicable - check via web interface at /help/about or in SmarterMail administration panel

Verify Fix Applied:

After updating, verify the build number is 9511 or higher in Help > About. Test that the force-reset-password endpoint now requires proper authentication.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /api/v1/authentication/force-reset-password
  • Unusual administrator password reset events
  • Failed authentication attempts followed by successful password resets

Network Indicators:

  • Unusual traffic patterns to the password reset API endpoint
  • External IP addresses accessing administrative functions

SIEM Query:

source="smartermail" AND (uri_path="/api/v1/authentication/force-reset-password" OR event_type="password_reset")

🔗 References

📤 Share & Export