Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25067: CWE-706 Use of Incorrectly-Resolved Name or Reference in SmarterTools SmarterMail

0
Medium
VulnerabilityCVE-2026-25067cvecve-2026-25067cwe-706
Published: Thu Jan 29 2026 (01/29/2026, 03:38:02 UTC)
Source: CVE Database V5
Vendor/Project: SmarterTools
Product: SmarterMail

Description

CVE-2026-25067 is a medium-severity unauthenticated path coercion vulnerability in SmarterTools SmarterMail versions prior to build 9518. The vulnerability arises from the background-of-the-day preview endpoint, which base64-decodes attacker-supplied input and uses it as a filesystem path without proper validation. On Windows systems, this allows resolution of UNC paths, causing the SmarterMail service to initiate outbound SMB authentication attempts to attacker-controlled hosts. This behavior can be exploited for credential coercion, NTLM relay attacks, and unauthorized network authentication. No user interaction or authentication is required to exploit this vulnerability, and no known exploits are currently reported in the wild. The CVSS 4. 0 score is 6. 9, reflecting a medium severity level. Organizations using affected SmarterMail versions should prioritize patching or mitigating this issue to prevent potential credential theft or lateral movement within networks.

AI-Powered Analysis

AILast updated: 01/29/2026, 04:35:22 UTC

Technical Analysis

CVE-2026-25067 is a vulnerability classified under CWE-706 (Use of Incorrectly-Resolved Name or Reference) affecting SmarterTools SmarterMail versions prior to build 9518. The vulnerability exists in the background-of-the-day preview endpoint, which accepts base64-encoded input from unauthenticated users. This input is decoded and directly used as a filesystem path without validation or sanitization. On Windows systems, this flaw enables the resolution of UNC (Universal Naming Convention) paths, which are network paths typically used to access shared resources. When a UNC path is resolved, the SmarterMail service attempts to authenticate to the specified network location using SMB (Server Message Block) protocol. An attacker can exploit this by supplying a crafted base64-encoded UNC path pointing to an attacker-controlled SMB server. This forces the SmarterMail server to initiate outbound SMB authentication attempts, leaking NTLM hashes or other credentials. These leaked credentials can then be used in credential coercion attacks or NTLM relay attacks, potentially allowing attackers to gain unauthorized access to internal network resources or escalate privileges. The vulnerability requires no authentication or user interaction, increasing its risk. Although no public exploits are currently known, the vulnerability’s nature makes it a significant risk for organizations relying on SmarterMail on Windows platforms. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and limited confidentiality impact but no integrity or availability impact, resulting in a medium severity rating.

Potential Impact

For European organizations, this vulnerability poses a risk of credential theft and unauthorized network authentication, which can lead to lateral movement within corporate networks and potential data breaches. Organizations using SmarterMail on Windows servers may have their NTLM credentials exposed to attackers controlling malicious SMB servers, facilitating further attacks such as NTLM relay or man-in-the-middle attacks. This could compromise sensitive email communications and internal network resources. Given the unauthenticated nature of the exploit, attackers can attempt exploitation remotely without prior access, increasing the threat surface. Industries with high reliance on email infrastructure, such as finance, healthcare, and government sectors, are particularly at risk. Additionally, organizations with hybrid or remote work environments that expose SmarterMail services to the internet are more vulnerable. The impact is compounded by the difficulty in detecting such outbound SMB authentication attempts if proper network monitoring is not in place.

Mitigation Recommendations

1. Upgrade SmarterMail to build 9518 or later where the vulnerability is patched. 2. If immediate patching is not possible, restrict outbound SMB traffic (ports 445 and 139) from SmarterMail servers at the network perimeter or firewall to prevent unauthorized SMB authentication attempts. 3. Implement network monitoring and alerting for unusual outbound SMB connections originating from SmarterMail servers to detect potential exploitation attempts. 4. Employ SMB signing and enforce NTLMv2 authentication to reduce the risk of credential relay attacks. 5. Use application-layer filtering or web application firewalls (WAFs) to validate and sanitize inputs to the background-of-the-day preview endpoint, blocking suspicious base64-encoded paths. 6. Conduct regular credential audits and consider implementing multi-factor authentication (MFA) for critical systems to mitigate the impact of credential theft. 7. Educate security teams to recognize signs of NTLM relay and credential coercion attacks and respond promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-28T21:47:35.119Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697ae0284623b1157c685561

Added to database: 1/29/2026, 4:20:56 AM

Last enriched: 1/29/2026, 4:35:22 AM

Last updated: 1/29/2026, 7:57:39 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats