SmarterMail < 100.0.9511 Auth Bypass (CVE-2026-23760)

critical Nessus Plugin ID 297224

Synopsis

The remote mail server is affected by an authentication bypass vulnerability.

Description

The version of SmarterTools SmarterMail installed on the remote host is prior to 100.0.9511. It is, therefore, affected by an authentication bypass vulnerability. SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance.
NOTE: SmarterMail system administrator privileges grant the ability to execute operating system commands via built-in management functionality, effectively providing administrative (SYSTEM or root) access on the underlying host.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to SmarterTools SmarterMail version 100.0.9511 or later.

See Also

http://www.nessus.org/u?5fa9f963

https://www.smartertools.com/smartermail/release-notes/current

Plugin Details

Severity: Critical

ID: 297224

File Name: smartertools_smartermail_CVE-2026-23760.nasl

Version: 1.1

Type: remote

Family: CGI abuses

Published: 1/30/2026

Updated: 1/30/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2026-23760

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:smartertools:smartermail

Required KB Items: installed_sw/SmarterTools SmarterMail

Patch Publication Date: 1/15/2026

Vulnerability Publication Date: 1/22/2026

CISA Known Exploited Vulnerability Due Dates: 2/16/2026

Reference Information

CVE: CVE-2026-23760