Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 09 Mar 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 05 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:smartertools:smartermail:*:*:*:*:*:*:*:* |
Thu, 29 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Smartertools
Smartertools smartermail |
|
| Vendors & Products |
Smartertools
Smartertools smartermail |
Thu, 29 Jan 2026 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SmarterTools SmarterMail versions prior to build 9518 contain an unauthenticated path coercion vulnerability in the background-of-the-day preview endpoint. The application base64-decodes attacker-supplied input and uses it as a filesystem path without validation. On Windows systems, this allows UNC paths to be resolved, causing the SmarterMail service to initiate outbound SMB authentication attempts to attacker-controlled hosts. This can be abused for credential coercion, NTLM relay attacks, and unauthorized network authentication. | |
| Title | SmarterTools SmarterMail < Build 9518 Unauthenticated background-of-the-day Path Coercion | |
| Weaknesses | CWE-706 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T01:30:42.395Z
Reserved: 2026-01-28T21:47:35.119Z
Link: CVE-2026-25067
Updated: 2026-01-29T17:51:44.801Z
Status : Analyzed
Published: 2026-01-29T05:16:13.157
Modified: 2026-03-09T14:29:14.610
Link: CVE-2026-25067
No data.
OpenCVE Enrichment
Updated: 2026-04-18T01:45:33Z