SB2026012223 - Authentication bypass and remote code execution in SmarterTools SmarterMail
Published: January 22, 2026 Updated: February 6, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Improper authentication (CVE-ID: CVE-2026-23760)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to an error in the password reset feature. A remote non-authenticated attacker can reset password of an administrative user and gain full access to the application, including ability to execute system commands.
2) OS Command Injection (CVE-ID: CVE-2026-24423)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to missing authentication in the ConnectToHub API method. A remote non-authenticated attacker can send a specially crafted HTTP request and execute arbitrary OS commands on the system.
Remediation
Install update from vendor's website.
References
- https://labs.watchtowr.com/attackers-with-decompilers-strike-again-smartertools-smartermail-wt-2026-0001-auth-bypass/
- https://portal.smartertools.com/community/a97681/new-user-on-google_abc_com.aspx?ref=labs.watchtowr.com
- https://code-white.com/public-vulnerability-list/#systemadminsettingscontrollerconnecttohub-missing-authentication-in-smartermail
- https://www.smartertools.com/smartermail/release-notes/current
- https://www.vulncheck.com/advisories/smartertools-smartermail-unauthenticated-rce-via-connecttohub-api