Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Email Security

Fresh SmarterMail Flaw Exploited for Admin Access

The exploitation of the authentication bypass vulnerability started two days after patches were released.

Email hack

Threat actors started exploiting an authentication bypass vulnerability in the SmarterTools SmarterMail business email and collaboration server roughly two days after patches were released, security researchers warn.

Tracked as CVE-2026-23760 (CVSS score of 9.3), the security defect impacts the password reset API of the application and allows attackers to reset passwords without authentication.

The issue exists because the force-reset-password function allows unauthenticated requests containing user-control parameters and does not verify the old password or a reset token for administrator accounts.

This enables an attacker who knows an administrator’s username to reset the account’s password without authentication and take control of the vulnerable SmarterMail instance.

According to WatchTowr, the flaw can be exploited for remote code execution (RCE) through SmarterMail functionality that enables a system administrator to execute operating system commands.

After resetting an admin’s account, the attacker can create a new volume in the settings menu and include a command in the Volume Mount Command field. Because the command is executed by the underlying OS, the attacker achieves complete RCE on the host.

Advertisement. Scroll to continue reading.

The authentication bypass issue was addressed in SmarterMail version 9511, which was released on January 15.

WatchTowr says it has seen widespread exploitation of CVE-2026-23760 for nearly a week and assumes that threat actors have reverse-engineered the fix.

“We’re seeing active, widespread exploitation of a new bug that received a patch less than a week ago. The fix has already been reverse-engineered, and exploitation leads straight to full RCE,” WatchTowr founder and CEO Benjamin Harris told SecurityWeek.

On Thursday, Huntress warned that hackers have been exploiting the application’s System Events functionality in attacks targeting the SmarterMail authentication bypass.

The cybersecurity firm observed threat actors making HTTP POST requests to vulnerable instances to exploit CVE-2026-23760, obtain valid access tokens, configure a malicious System Event, add a new domain to SmarterMail, and perform clean-up operations.

Likely meant for reconnaissance, the malicious System Event was triggered by the addition of the new domain, Huntress says.

Users should update their SmarterMail instances to a patched release as soon as possible.

“Given the severity of this vulnerability, active exploitation, and exploitation of the additional CVE-2025-52691 being observed in the wild, businesses should prioritize the deployment of SmarterMail updates and review any outdated systems for signs of infection,” Huntress notes.

Related: Old Attack, New Speed: Researchers Optimize Page Cache Exploits

Related: Cisco Patches Vulnerability Exploited by Chinese Hackers

Related: Exploit for VMware Zero-Day Flaws Likely Built a Year Before Public Disclosure

Related: Complex Routing, Misconfigurations Exploited for Domain Spoofing in Phishing Attacks

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Anti-ransomware platform Halcyon has named Kirstjen Nielsen and Chris Inglis as Strategic Advisors.

ThreatModeler has appointed Kevin Gallagher as Chief Executive Officer.

Thomas Bain has been appointed Chief Marketing Officer at Silent Push.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.