PROBABLYPWNED
VulnerabilitiesJanuary 27, 20264 min read

SmarterMail Auth Bypass Lets Attackers Reset Admin Passwords

CVE-2026-23760 enables unauthenticated admin takeover in SmarterMail. Exploitation began two days after patch release.

Marcus Chen

Attackers are exploiting a critical authentication bypass in SmarterMail that allows unauthenticated password resets for administrator accounts. CVE-2026-23760 requires no credentials and chains directly to remote code execution with SYSTEM privileges.

CISA added the vulnerability to its Known Exploited Vulnerabilities catalog on January 26, confirming active exploitation that began within days of the patch release. This is the second SmarterMail vulnerability added to the KEV catalog this month, following CVE-2025-52691's CVSS 10.0 RCE flaw disclosed in December.

SmarterMail users running versions prior to Build 9511 should treat this as a priority-one issue.

How the Attack Works

The vulnerability exists in SmarterMail's password reset functionality. The /api/v1/auth/force-reset-password endpoint accepts JSON requests containing an administrator username, new password, and an IsSysAdmin flag.

For administrator accounts, the endpoint skips validation of the current password. An attacker submits a request with the default "admin" username, their chosen new password, and IsSysAdmin set to true. The server processes the request without verifying the caller has any existing access.

Security researchers at watchTowr, who analyzed the vulnerability, noted that the patched version adds password validation that was absent in vulnerable builds. The fix calls ValidatePassword(inputs.OldPassword, null) before processing admin password changes—a check that should have existed from the start.

From Admin Access to Full Compromise

Password reset alone would be serious. But SmarterMail includes a feature that escalates the impact significantly.

System administrators can configure "Volume Mount Commands"—OS commands that execute with SYSTEM-level privileges. Legitimate use cases involve storage management. Attackers use it for arbitrary code execution.

The attack chain:

  1. Reset admin password via CVE-2026-23760
  2. Log in as administrator
  3. Navigate to Settings → Volume Mounts
  4. Enter malicious command
  5. Command executes with SYSTEM privileges

From zero access to full host compromise in under a minute.

Exploitation Timeline

The speed from patch to exploitation stands out:

  • January 8: Vulnerability discovered and reported
  • January 15: SmarterMail releases Build 9511 with fix
  • January 17: First exploitation attempts detected
  • January 21: watchTowr receives tip about widespread attacks
  • January 26: CISA adds CVE-2026-23760 to KEV catalog

Two days from patch to exploitation. Attackers reverse-engineered the fix and weaponized it before most organizations could deploy updates. This pattern has become common—patches reveal vulnerability details that sophisticated actors can work backward from.

Exposure Scope

SmarterMail is popular among small and medium businesses, web hosting providers, and organizations preferring on-premises email. Censys data from related vulnerability tracking showed nearly 16,000 internet-exposed SmarterMail instances, with over 12,500 in the United States alone.

Organizations running SmarterMail often lack dedicated security teams. The product serves environments where rapid patching is challenging and vulnerability scanning may be infrequent.

Compounding Risk

This marks SmarterMail's second KEV addition in recent months. CVE-2025-52691, a CVSS 10.0 file upload vulnerability enabling unauthenticated RCE, was added to the KEV catalog after Singapore's CSA issued a critical alert. That vulnerability affected builds prior to 9413.

Organizations that patched CVE-2025-52691 to Build 9413 but didn't continue updating remain vulnerable to CVE-2026-23760. The minimum safe version is now Build 9511.

The clustering of critical vulnerabilities raises questions about SmarterMail's security development practices. Two authentication-related flaws enabling complete server compromise within months suggests systemic issues worth considering when evaluating email infrastructure options.

Remediation Steps

  1. Update immediately to SmarterMail Build 9511 or later
  2. Audit administrator accounts for unexpected password changes
  3. Review Volume Mount configurations for malicious commands
  4. Check access logs for requests to /api/v1/auth/force-reset-password
  5. Rotate all admin credentials after patching

If forensic review reveals compromise indicators, assume full server breach. Attackers with SYSTEM access could have installed persistent backdoors, exfiltrated email data, or pivoted to other systems.

Why This Matters

Email servers hold organizational communications, credentials, contact lists, and sensitive attachments. Compromising an email server gives attackers leverage for further attacks—password reset interception, business email compromise, data exfiltration.

When an email platform accumulates multiple critical vulnerabilities enabling unauthenticated takeover, organizations should evaluate whether continued use aligns with their risk tolerance. For some, migration to cloud email with dedicated security teams may reduce exposure. Others may need to invest heavily in monitoring and rapid patching capabilities.

The immediate priority: patch before becoming another data point in the exploitation statistics CISA tracks. Build 9511 has been available since January 15. There's no acceptable reason to still be running vulnerable versions.

Related Articles