Логотип exploitDog
bind:CVE-2026-25067
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-25067

Количество 3

Количество 3

nvd логотип

CVE-2026-25067

11 дней назад

SmarterTools SmarterMail versions prior to build 9518 contain an unauthenticated path coercion vulnerability in the background-of-the-day preview endpoint. The application base64-decodes attacker-supplied input and uses it as a filesystem path without validation. On Windows systems, this allows UNC paths to be resolved, causing the SmarterMail service to initiate outbound SMB authentication attempts to attacker-controlled hosts. This can be abused for credential coercion, NTLM relay attacks, and unauthorized network authentication.

EPSS: Низкий
github логотип

GHSA-x74x-r4q4-c3rw

11 дней назад

SmarterTools SmarterMail versions prior to build 9518 contain an unauthenticated path coercion vulnerability in the background-of-the-day preview endpoint. The application base64-decodes attacker-supplied input and uses it as a filesystem path without validation. On Windows systems, this allows UNC paths to be resolved, causing the SmarterMail service to initiate outbound SMB authentication attempts to attacker-controlled hosts. This can be abused for credential coercion, NTLM relay attacks, and unauthorized network authentication.

EPSS: Низкий
fstec логотип

BDU:2026-01227

18 дней назад

Уязвимость почтового сервера SmarterTools SmarterMail, связанная с использованием имени с неправильной ссылкой, позволяющая нарушителю перехватить учетную запись пользователя

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-25067

SmarterTools SmarterMail versions prior to build 9518 contain an unauthenticated path coercion vulnerability in the background-of-the-day preview endpoint. The application base64-decodes attacker-supplied input and uses it as a filesystem path without validation. On Windows systems, this allows UNC paths to be resolved, causing the SmarterMail service to initiate outbound SMB authentication attempts to attacker-controlled hosts. This can be abused for credential coercion, NTLM relay attacks, and unauthorized network authentication.

0%
Низкий
11 дней назад
github логотип
GHSA-x74x-r4q4-c3rw

SmarterTools SmarterMail versions prior to build 9518 contain an unauthenticated path coercion vulnerability in the background-of-the-day preview endpoint. The application base64-decodes attacker-supplied input and uses it as a filesystem path without validation. On Windows systems, this allows UNC paths to be resolved, causing the SmarterMail service to initiate outbound SMB authentication attempts to attacker-controlled hosts. This can be abused for credential coercion, NTLM relay attacks, and unauthorized network authentication.

0%
Низкий
11 дней назад
fstec логотип
BDU:2026-01227

Уязвимость почтового сервера SmarterTools SmarterMail, связанная с использованием имени с неправильной ссылкой, позволяющая нарушителю перехватить учетную запись пользователя

CVSS3: 5.3
0%
Низкий
18 дней назад

Уязвимостей на страницу