SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance. NOTE: SmarterMail system administrator privileges grant the ability to execute operating system commands via built-in management functionality, effectively providing administrative (SYSTEM or root) access on the underlying host.
https://thehackernews.com/2026/02/warlock-ransomware-breaches.html
https://www.securityweek.com/smartertools-hit-by-ransomware-via-vulnerability-in-its-own-product/
https://www.helpnetsecurity.com/2026/02/06/ransomware-smartermail-cve-2026-24423/
https://thehackernews.com/2026/01/smartermail-fixes-critical.html
https://www.securityweek.com/fresh-smartermail-flaw-exploited-for-admin-access/
https://www.huntress.com/blog/smartermail-account-takeover-leading-to-rce
Published: 2026-01-22
Updated: 2026-01-27
Known Exploited Vulnerability (KEV)
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
Base Score: 9.3
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Severity: Critical
EPSS: 0.55749