SmarterTools SmarterMail versions prior to build 9518 contain an unauthenticated path coercion vulnerability in the background-of-the-day preview endpoint. The application base64-decodes attacker-supplied input and uses it as a filesystem path without validation. On Windows systems, this allows UNC paths to be resolved, causing the SmarterMail service to initiate outbound SMB authentication attempts to attacker-controlled hosts. This can be abused for credential coercion, NTLM relay attacks, and unauthorized network authentication.
Metrics
Affected Vendors & Products
References
History
Thu, 29 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Smartertools
Smartertools smartermail |
|
| Vendors & Products |
Smartertools
Smartertools smartermail |
Thu, 29 Jan 2026 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SmarterTools SmarterMail versions prior to build 9518 contain an unauthenticated path coercion vulnerability in the background-of-the-day preview endpoint. The application base64-decodes attacker-supplied input and uses it as a filesystem path without validation. On Windows systems, this allows UNC paths to be resolved, causing the SmarterMail service to initiate outbound SMB authentication attempts to attacker-controlled hosts. This can be abused for credential coercion, NTLM relay attacks, and unauthorized network authentication. | |
| Title | SmarterTools SmarterMail < Build 9518 Unauthenticated background-of-the-day Path Coercion | |
| Weaknesses | CWE-706 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-01-29T03:38:02.582Z
Updated: 2026-01-29T17:51:55.414Z
Reserved: 2026-01-28T21:47:35.119Z
Link: CVE-2026-25067
Updated: 2026-01-29T17:51:44.801Z
Status : Awaiting Analysis
Published: 2026-01-29T05:16:13.157
Modified: 2026-01-29T16:31:00.867
Link: CVE-2026-25067
No data.