Skip to content
Security Alerts

CVE-2026-23760: SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability

SmarterTools SmarterMail contains an authentication bypass using an alternate path or channel vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and ...

Summary

ParameterValue
CVE IDCVE-2026-23760
CVE Publication Year2026
Date Added to CISA KEV2026-01-26
VendorSmarterTools
ProductSmarterMail
CVSS Score9.8 (critical)
CISA KEV StatusYes - confirmed active exploitation
RansomwareNot confirmed
Remediation Deadline2026-02-16

Vulnerability Description

SmarterTools SmarterMail contains an authentication bypass using an alternate path or channel vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. This could allow an unauthenticated attacker to supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance.

Required Actions

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Who Is Affected?

This vulnerability affects SmarterMail by SmarterTools. Check if your organization uses this software and requires updates.

Sources


Need help securing your systems? nFlo team offers vulnerability management services. Contact us.

Share:

Talk to an expert

Have questions about this topic? Get in touch with our specialist.

Product Manager
Grzegorz Gnych

Grzegorz Gnych

Sales Representative

Response within 24 hours
Free consultation
Individual approach

Providing your phone number will speed up contact.

Want to Reduce IT Risk and Costs?

Book a free consultation - we respond within 24h

Response in 24h Free quote No obligations

Or download free guide:

Download NIS2 Checklist