An authentication bypass vulnerability in SmarterTools’ SmarterMail email server is now being actively exploited, allowing attackers to reset administrator passwords and take full control of affected systems. The flaw enables unauthenticated threat actors to hijack admin accounts and achieve complete compromise of the underlying Windows host.
Active exploitation of SmarterMail authentication bypass
Security researchers have confirmed in-the-wild exploitation of a critical authentication bypass affecting SmarterMail, a self-hosted email and collaboration platform developed by SmarterTools. The vulnerability allows attackers to reset system administrator credentials without authentication, granting immediate administrative access.
Researchers at watchTowr first disclosed the issue on January 8. SmarterTools released a fix on January 15; however, the flaw was already being exploited just days later, strongly suggesting that attackers reverse-engineered the patch to identify and weaponize the vulnerability.
Root cause: insecure force-reset-password API endpoint
The vulnerability originates in the force-reset-password API endpoint, which is intentionally exposed without authentication. This endpoint accepts attacker-controlled JSON input, including an IsSysAdmin boolean field. When set to true, the backend logic triggers a system administrator password reset.
Crucially, no security validation is performed. Despite the presence of an OldPassword field in the request, the backend does not verify it or enforce any authentication checks. As a result, any unauthenticated attacker who knows or can guess an administrator username can arbitrarily set a new password and seize control of the account.
The flaw impacts only administrator-level accounts, but the security implications are severe. With admin access to SmarterMail, attackers can execute operating system commands, effectively achieving full remote code execution (RCE) on the server.
Privilege escalation to SYSTEM-level access
watchTowr researchers developed a proof-of-concept exploit demonstrating SYSTEM-level shell access on vulnerable servers. This confirms that successful exploitation goes far beyond email compromise and can result in total host takeover, data theft, service disruption, or use of the server as a pivot point for further attacks.
Evidence of real-world exploitation emerged after an anonymous tipster reported active administrator password resets. Supporting evidence was found in shared logs and a forum post describing similar incidents. Analysis of the logs showed repeated requests to the force-reset-password endpoint, directly linking the attacks to this vulnerability.
A pattern of critical SmarterMail vulnerabilities
This issue follows closely after another severe SmarterMail flaw discovered by watchTowr just two weeks earlier: a pre-authentication remote code execution vulnerability tracked as CVE-2025-52691. The proximity of these findings highlights systemic risks in exposed SmarterMail attack surfaces and reinforces the importance of rapid patching and continuous security review.
CVE assignment and third-party confirmation
As of January 23, the authentication bypass vulnerability has been assigned CVE-2026-23760 and rated critical with a CVSS score of 9.3. The high severity reflects the lack of authentication, ease of exploitation, and direct path to full system compromise.
Independent confirmation of active exploitation has also been published by Huntress, whose researchers observed similar attacker behavior targeting SmarterMail instances in the wild.
Mitigation and recommended actions
SmarterMail users are strongly advised to upgrade immediately to version Build 9511, released on January 15, which addresses both the authentication bypass and the earlier pre-auth RCE vulnerability. Given the active exploitation, exposed SmarterMail servers should be treated as potentially compromised until verified otherwise.
From a cybersecurity best-practice standpoint, administrators should also review access logs for suspicious password reset activity, rotate credentials, restrict API exposure where possible, and ensure that internet-facing management interfaces are properly secured. This incident serves as a reminder that unauthenticated administrative endpoints represent a critical risk, particularly in widely deployed infrastructure services such as email servers.
