CVE-2026-25067

SmarterTools SmarterMail versions prior to build 9518 containĀ an unauthenticated path coercion vulnerability in the background-of-the-day preview endpoint. The application base64-decodes attacker-supplied input and uses it as a filesystem path without validation. On Windows systems, this allows UNC paths to be resolved, causing the SmarterMail service to initiate outbound SMB authentication attempts to attacker-controlled hosts. This can be abused for credential coercion, NTLM relay attacks, and unauthorized network authentication.
Configurations

Configuration 1 (hide)

cpe:2.3:a:smartertools:smartermail:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-01-29 05:16

Updated : 2026-03-09 14:29


NVD link : CVE-2026-25067

Mitre link : CVE-2026-25067

CVE.ORG link : CVE-2026-25067


JSON object : View

Products Affected

smartertools

  • smartermail
CWE
CWE-706

Use of Incorrectly-Resolved Name or Reference