Summary
| Parameter | Value |
|---|---|
| CVE ID | CVE-2026-23760 |
| CVE Publication Year | 2026 |
| Date Added to CISA KEV | 2026-01-26 |
| Vendor | SmarterTools |
| Product | SmarterMail |
| CVSS Score | 9.8 (critical) |
| CISA KEV Status | Yes - confirmed active exploitation |
| Ransomware | Not confirmed |
| Remediation Deadline | 2026-02-16 |
Vulnerability Description
SmarterTools SmarterMail contains an authentication bypass using an alternate path or channel vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. This could allow an unauthenticated attacker to supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance.
Required Actions
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Who Is Affected?
This vulnerability affects SmarterMail by SmarterTools. Check if your organization uses this software and requires updates.
Sources
Need help securing your systems? nFlo team offers vulnerability management services. Contact us.
