Home

Description

SmarterTools SmarterMail versions prior to build 9518 contain an unauthenticated path coercion vulnerability in the background-of-the-day preview endpoint. The application base64-decodes attacker-supplied input and uses it as a filesystem path without validation. On Windows systems, this allows UNC paths to be resolved, causing the SmarterMail service to initiate outbound SMB authentication attempts to attacker-controlled hosts. This can be abused for credential coercion, NTLM relay attacks, and unauthorized network authentication.

PUBLISHED Reserved 2026-01-28 | Published 2026-01-29 | Updated 2026-01-29 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-706 Use of Incorrectly-Resolved Name or Reference

Product status

Default status
unaffected

Any version before 100.0.9518
affected

Credits

Cale Black of VulnCheck finder

References

www.smartertools.com/smartermail/release-notes/current release-notes patch

www.vulncheck.com/...ted-background-of-the-day-path-coercion third-party-advisory

cve.org (CVE-2026-25067)

nvd.nist.gov (CVE-2026-25067)

Download JSON