SmarterTools SmarterMail versions prior to build 9518 containĀ an unauthenticated path coercion vulnerability in the background-of-the-day preview endpoint. The application base64-decodes attacker-supplied input and uses it as a filesystem path without validation. On Windows systems, this allows UNC paths to be resolved, causing the SmarterMail service to initiate outbound SMB authentication attempts to attacker-controlled hosts. This can be abused for credential coercion, NTLM relay attacks, and unauthorized network authentication.
References
| Link | Resource |
|---|---|
| https://www.smartertools.com/smartermail/release-notes/current | Release Notes |
| https://www.vulncheck.com/advisories/smartertools-smartermail-unauthenticated-background-of-the-day-path-coercion | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-01-29 05:16
Updated : 2026-03-09 14:29
NVD link : CVE-2026-25067
Mitre link : CVE-2026-25067
CVE.ORG link : CVE-2026-25067
JSON object : View
Products Affected
smartertools
- smartermail
CWE
CWE-706
Use of Incorrectly-Resolved Name or Reference
