SB2026012223 - Authentication bypass and remote code execution in SmarterTools SmarterMail



SB2026012223 - Authentication bypass and remote code execution in SmarterTools SmarterMail

Published: January 22, 2026 Updated: February 6, 2026

Security Bulletin ID SB2026012223
Severity
Critical
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Improper authentication (CVE-ID: CVE-2026-23760)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to an error in the password reset feature. A remote non-authenticated attacker can reset password of an administrative user and gain full access to the application, including ability to execute system commands. 


2) OS Command Injection (CVE-ID: CVE-2026-24423)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to missing authentication in the ConnectToHub API method. A remote non-authenticated attacker can send a specially crafted HTTP request and execute arbitrary OS commands on the system.


Remediation

Install update from vendor's website.