Логотип exploitDog
bind:CVE-2026-23760
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-23760

Количество 3

Количество 3

nvd логотип

CVE-2026-23760

13 дней назад

SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance. NOTE: SmarterMail system administrator privileges grant the ability to execute operating system commands via built-in management functionality, effectively providing administrative (SYSTEM or root) access on the underlying host.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-mj6x-679w-76wr

13 дней назад

SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance.

CVSS3: 9.8
EPSS: Средний
fstec логотип

BDU:2026-00824

21 день назад

Уязвимость прикладного программного интерфейса force-reset-password почтового сервера SmarterTools SmarterMail, позволяющая нарушителю обновить пароль администратора до значения по умолчанию и получить несанкционированный доступ к серверу

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-23760

SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance. NOTE: SmarterMail system administrator privileges grant the ability to execute operating system commands via built-in management functionality, effectively providing administrative (SYSTEM or root) access on the underlying host.

CVSS3: 9.8
52%
Средний
13 дней назад
github логотип
GHSA-mj6x-679w-76wr

SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance.

CVSS3: 9.8
52%
Средний
13 дней назад
fstec логотип
BDU:2026-00824

Уязвимость прикладного программного интерфейса force-reset-password почтового сервера SmarterTools SmarterMail, позволяющая нарушителю обновить пароль администратора до значения по умолчанию и получить несанкционированный доступ к серверу

CVSS3: 9.8
52%
Средний
21 день назад

Уязвимостей на страницу