top of page
perceptive_background_267k.jpg

SmarterTools SmarterMail contains an authentication bypass using an alternate path or channel vulnerability in the password reset API. The force-reset-password …

Published:

26 January 2026 at 00:00:00

Alert date:

26 January 2026 at 21:02:17

Source:

cisa.gov

Click to open the original link from this advisory

Enterprise Applications, Email & Messaging, Identity & Access

SmarterTools SmarterMail contains a critical authentication bypass vulnerability in its password reset API. The force-reset-password endpoint accepts anonymous requests and fails to verify existing passwords or reset tokens when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and new password to reset the account, leading to full administrative compromise of the SmarterMail instance. This vulnerability allows complete takeover of email server infrastructure without any authentication.

Technical details

Mitigation steps:

Affected products:

SmarterTools SmarterMail

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page