


Perceptive Security
SOC/SIEM Consultancy

SmarterTools SmarterMail contains an authentication bypass using an alternate path or channel vulnerability in the password reset API. The force-reset-password …
Published:
26 januari 2026 om 00:00:00
Alert date:
26 januari 2026 om 21:02:17
Source:
cisa.gov
Enterprise Applications, Email & Messaging, Identity & Access
SmarterTools SmarterMail contains a critical authentication bypass vulnerability in its password reset API. The force-reset-password endpoint accepts anonymous requests and fails to verify existing passwords or reset tokens when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and new password to reset the account, leading to full administrative compromise of the SmarterMail instance. This vulnerability allows complete takeover of email server infrastructure without any authentication.
Technical details
Mitigation steps:
Affected products:
SmarterTools SmarterMail
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-23760
https://www.smartertools.com/smartermail/release-notes/current
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
