Home

Description

SmarterTools SmarterMail builds prior to 9560 contain a local file inclusion vulnerability in the /api/v1/report/summary/{type} API endpoint that allows authenticated users to read arbitrary .json files on the system. Attackers can exploit this vulnerability combined with weak encryption algorithms and hardcoded keys to decrypt and access stored passwords and 2FA secrets for all users.

PUBLISHED Reserved 2026-05-04 | Published 2026-05-08 | Updated 2026-05-08 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

Any version before 9560
affected

Credits

dninh of SACOMBANK finder

References

www.smartertools.com/smartermail/release-notes/current release-notes patch

www.vulncheck.com/...-via-the-api-v1-report-summary-type-api third-party-advisory

cve.org (CVE-2026-7807)

nvd.nist.gov (CVE-2026-7807)

Download JSON