top of page

Critical SmarterMail RCE Exploited in the Wild

  • Jan 22
  • 2 min read

Key Findings


  • Researchers at watchTowr Labs have discovered a critical vulnerability in SmarterMail, tracked as WT-2026-0001, that allows unauthenticated attackers to hijack administrative accounts and achieve full Remote Code Execution (RCE).

  • The vulnerability lies within the force-reset-password API endpoint, which fails to implement proper security checks for system administrators.

  • Attackers can simply send a JSON request with IsSysAdmin set to true, the target username, and a new password to take over the administrator's account without validating the old password.

  • Threat actors are actively exploiting this flaw to seize control of email servers, with evidence of successful attacks just two days after the vendor released a patch.

  • The report highlights that SmarterMail includes a feature for "Volume Mounts" that allows administrators to execute arbitrary operating system commands, effectively serving as a built-in backdoor for those with admin rights.


Background


The discovery of this critical vulnerability comes just weeks after a previous Remote Code Execution (RCE) incident in the SmarterMail ecosystem. According to the researchers, the situation has "a timeline that is typically reserved for KEV hall-of-famers".


Authentication Bypass Vulnerability


The vulnerability lies within the force-reset-password API endpoint of the SmarterMail web interface. This endpoint, intended for legitimate password recovery, fails to implement basic security checks for system administrators.


The endpoint is marked to allow anonymous access, which is standard for reset flows. However, the critical failure occurs in the logic handling admin requests. There are no security controls in place, no authentication, no authorization, and no verification of the old password.


Attackers can simply send a JSON request with IsSysAdmin set to true, the target username, and a new password. The system will then overwrite the administrator's credentials without validating the old password, a step that ironically is enforced for regular users.


The researchers confirm that this is a complete authentication bypass for the system administrator account, allowing attackers to "Enjoy your admin access!"


Active Exploitation


The report highlights that threat actors are actively exploiting this flaw to seize control of email servers. watchTowr received a tip from an anonymous reader whose logs showed suspicious activity just days after the vendor released a patch.


The provided logs reveal an efficient attack pattern: the attacker logs in successfully as an admin, creates a malicious event, and then creates a new domain - all within a matter of minutes. The key log entry that confirms the exploitation of the WT-2026-0001 vulnerability is the "User @ successfully force-reset-password" entry.


Remote Code Execution


Accessing the admin panel is only the first step. SmarterMail includes a feature for "Volume Mounts" that allows administrators to map storage drives. This feature effectively serves as a built-in backdoor for those with admin rights, as it enables the execution of arbitrary operating system commands.


By creating a new volume and supplying an arbitrary command (such as cmd.exe /c calc) in the Volume Mount Command field, attackers can trigger immediate execution by the underlying OS. The researchers' proof of concept demonstrates that this results in a SYSTEM-level shell on the target host.


Vendor Response


SmarterTools released Build 9511 on January 15, 2026, to address this vulnerability. The patch adds a validation step that checks the user's old password before allowing a reset.


Sources


  • https://securityonline.info/enjoy-your-admin-access-critical-smartermail-rce-exploited-in-the-wild/

  • https://securityonline.info/under-attack-critical-cisco-rce-cve-2026-20045-exploited-in-the-wild/

  • https://thehackernews.com/2026/01/smartermail-auth-bypass-exploited-in.html

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page