Description
SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance.
Problem types
CWE-288 Authentication Bypass Using an Alternate Path or Channel
Product status
Any version before 100.0.9511
Credits
Piotr Bazydlo & Sina Kheirkhah of watchTowr
References
www.smartertools.com/smartermail/release-notes/current
labs.watchtowr.com/...-smartermail-wt-2026-0001-auth-bypass/
www.vulncheck.com/...ntication-bypass-via-password-reset-api