theinfosecnews

CVE-2026-23760

CISA KEV

Published January 26, 2026 · Updated April 3, 2026

high

What This Means

# CVE-2026-23760: SmarterMail Authentication Bypass **Vulnerability:** SmarterTools SmarterMail's `/force-reset-password` API endpoint accepts unauthenticated requests and does not validate existing passwords or reset tokens before allowing admin account password changes. **Impact:** An unauthenticated attacker can reset any administrator account password, gaining full administrative control of the SmarterMail instance without credentials. **Actions:** Immediately inventory SmarterMail deployments. Apply the vendor patch when available. Restrict network access to the password reset API endpoint. Monitor authentication logs for suspicious password reset requests. If patching is delayed, implement IP whitelisting on administrative functions or disable the affected endpoint until remediation is complete.

Official Description+

SmarterTools SmarterMail contains an authentication bypass using an alternate path or channel vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. This could allow an unauthenticated attacker to supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance.

Affected Products

VendorProduct
SmarterToolsSmarterMail

Patch Status

Patch by 2026-02-16

Recommended Actions

  1. Check if your systems use any of the affected products listed above.
  2. Apply vendor patches immediately if available.
  3. This vulnerability is in CISA's Known Exploited Vulnerabilities catalog — prioritize remediation.
  4. Monitor vendor advisories for updates and additional mitigations.
  5. Review logs for indicators of compromise related to CVE-2026-23760.