SmarterMail RCE via ConnectToHub API - Unauthenticated Remote Code Execution
CVE-2026-24423 Published on January 23, 2026
SmarterTools SmarterMail < Build 9511 Unauthenticated RCE via ConnectToHub API
SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application.
Known Exploited Vulnerability
This SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. SmarterTools SmarterMail contains a missing authentication for critical function vulnerability in the ConnectToHub API method. This could allow the attacker to point the SmarterMail instance to a malicious HTTP server which serves the malicious OS command and could lead to command execution. .
The following remediation steps are recommended / required by February 26, 2026: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Weakness Type
Missing Authentication for Critical Function
The software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Products Associated with CVE-2026-24423
Want to know whenever a new CVE is published for Smartertools Smartermail? stack.watch will email you.
Affected Versions
SmarterTools SmarterMail:- Before 100.0.9511 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.