Количество 3
Количество 3
CVE-2026-23760
SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance. NOTE: SmarterMail system administrator privileges grant the ability to execute operating system commands via built-in management functionality, effectively providing administrative (SYSTEM or root) access on the underlying host.
GHSA-mj6x-679w-76wr
SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance.
BDU:2026-00824
Уязвимость прикладного программного интерфейса force-reset-password почтового сервера SmarterTools SmarterMail, позволяющая нарушителю обновить пароль администратора до значения по умолчанию и получить несанкционированный доступ к серверу
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2026-23760 SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance. NOTE: SmarterMail system administrator privileges grant the ability to execute operating system commands via built-in management functionality, effectively providing administrative (SYSTEM or root) access on the underlying host. | CVSS3: 9.8 | 52% Средний | 13 дней назад | |
GHSA-mj6x-679w-76wr SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance. | CVSS3: 9.8 | 52% Средний | 13 дней назад | |
BDU:2026-00824 Уязвимость прикладного программного интерфейса force-reset-password почтового сервера SmarterTools SmarterMail, позволяющая нарушителю обновить пароль администратора до значения по умолчанию и получить несанкционированный доступ к серверу | CVSS3: 9.8 | 52% Средний | 21 день назад |
Уязвимостей на страницу