Home / Vulnerabilities / CVE-2026-23760
CRITICAL SEVERITY
CVE-2026-23760 SmarterTools · SmarterMail

SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability

Technical Severity

CVSS v3.1 Metrics

CRITICAL
9.8 / 10
Minimal Risk Critical
Vector Specification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Likelihood

EPSS Prediction

52.36 %
Predictive Probability
Percentile Rank
97.8 th

Documented as more likely to be exploited than 97.8% of known CVEs.

Detection Date

Jan 26, 2026

Remediation Due

Feb 16, 2026

CISA Catalog Active

Threat Analysis

SmarterTools SmarterMail contains an authentication bypass using an alternate path or channel vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. This could allow an unauthenticated attacker to supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance.

Remediation Directive

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

External Intelligence