Smartertools
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Smartertools product.
RSS Feeds for Smartertools security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Smartertools products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Smartertools Sorted by Most Security Vulnerabilities since 2018
Known Exploited Smartertools Vulnerabilities
The following Smartertools vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.
| Title | Description | Added |
|---|---|---|
| SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability |
SmarterTools SmarterMail contains a missing authentication for critical function vulnerability in the ConnectToHub API method. This could allow the attacker to point the SmarterMail instance to a malicious HTTP server which serves the malicious OS command and could lead to command execution. CVE-2026-24423 Exploit Probability: 66.4% |
February 5, 2026 |
| SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability |
SmarterTools SmarterMail contains an unrestricted upload of file with dangerous type vulnerability that could allow an unauthenticated attacker to upload arbitrary files to any location on the mail server, potentially enabling remote code execution. CVE-2025-52691 Exploit Probability: 87.3% |
January 26, 2026 |
| SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability |
SmarterTools SmarterMail contains an authentication bypass using an alternate path or channel vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. This could allow an unauthenticated attacker to supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance CVE-2026-23760 Exploit Probability: 78.7% |
January 26, 2026 |
Of the known exploited vulnerabilities above, 2 are in the top 1%, or the 99th percentile of the EPSS exploit probability rankings. The vulnerability CVE-2026-24423: SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability is in the top 5% of the currently known exploitable vulnerabilities.
By the Year
In 2026 there have been 5 vulnerabilities in Smartertools with an average score of 7.4 out of ten. Last year, in 2025 Smartertools had 1 security vulnerability published. That is, 4 more vulnerabilities have already been reported in 2026 as compared to last year. Last year, the average CVE base score was greater by 2.65
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 5 | 7.35 |
| 2025 | 1 | 10.00 |
| 2024 | 0 | 0.00 |
| 2023 | 3 | 5.40 |
| 2022 | 4 | 6.48 |
| 2021 | 5 | 7.10 |
| 2020 | 0 | 0.00 |
| 2019 | 4 | 7.65 |
It may take a day or so for new Smartertools vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Smartertools Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2026-26930 | Feb 16, 2026 |
SmarterMail XSS via MAPI requests (pre-9526)SmarterTools SmarterMail before 9526 allows XSS via MAPI requests. |
|
| CVE-2026-25067 | Jan 29, 2026 |
SmarterMail Unauth Path Coercion Enables SMB Relay on WindowsSmarterTools SmarterMail versions prior to build 9518 contain an unauthenticated path coercion vulnerability in the background-of-the-day preview endpoint. The application base64-decodes attacker-supplied input and uses it as a filesystem path without validation. On Windows systems, this allows UNC paths to be resolved, causing the SmarterMail service to initiate outbound SMB authentication attempts to attacker-controlled hosts. This can be abused for credential coercion, NTLM relay attacks, and unauthorized network authentication. |
|
| CVE-2026-24423 | Jan 23, 2026 |
SmarterMail RCE via ConnectToHub API - Unauthenticated Remote Code ExecutionSmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application. |
|
| CVE-2026-23760 | Jan 22, 2026 |
SmarterMail Auth Bypass via Force Reset Password (CVE-2026-23760)SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance. NOTE: SmarterMail system administrator privileges grant the ability to execute operating system commands via built-in management functionality, effectively providing administrative (SYSTEM or root) access on the underlying host. |
|
| CVE-2020-36926 | Jan 15, 2026 |
SmarterTrack Info Disclosure Chat Search /Management/Chat/frmChatSearch.aspxSmarterTrack 7922 contains an information disclosure vulnerability in the Chat Management search form that reveals agent identification details. Attackers can access the vulnerable /Management/Chat/frmChatSearch.aspx endpoint to retrieve agents' first and last names along with their unique identifiers. |
|
| CVE-2025-52691 | Dec 29, 2025 |
Successful exploitation of the vulnerability couldSuccessful exploitation of the vulnerability could allow an unauthenticated attacker to upload arbitrary files to any location on the mail server, potentially enabling remote code execution. |
|
| CVE-2023-48115 | Dec 21, 2023 |
SmarterTools SmarterMail DOM XSS via messageHTML/PlainText (CVE-2023-48115)SmarterTools SmarterMail 8495 through 8664 before 8747 allows stored DOM XSS because an XSS protection mechanism is skipped when messageHTML and messagePlainText are set in the same request. |
|
| CVE-2023-48116 | Dec 21, 2023 |
SmarterMail Stored XSS via Calendar DescriptionSmarterTools SmarterMail 8495 through 8664 before 8747 allows stored XSS via a crafted description of a Calendar appointment. |
|
| CVE-2023-48114 | Dec 21, 2023 |
SmarterMail XSS via SVG Upload with @ char in youtube.com URLSmarterTools SmarterMail 8495 through 8664 before 8747 allows stored XSS by using image/svg+xml and an uploaded SVG document. This occurs because the application tries to allow youtube.com URLs, but actually allows youtube.com followed by an @ character and an attacker-controlled domain name. |
|
| CVE-2022-24385 | Mar 14, 2022 |
A Direct Object Access vulnerability in SmarterTools SmarterTrack leads to information disclosure This issue affects: SmarterTools SmarterTrack 100.0.8019.14010.A Direct Object Access vulnerability in SmarterTools SmarterTrack leads to information disclosure This issue affects: SmarterTools SmarterTrack 100.0.8019.14010. |
|