Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25067: CWE-706 Use of Incorrectly-Resolved Name or Reference in SmarterTools SmarterMail

0
Medium
VulnerabilityCVE-2026-25067cvecve-2026-25067cwe-706
Published: Thu Jan 29 2026 (01/29/2026, 03:38:02 UTC)
Source: CVE Database V5
Vendor/Project: SmarterTools
Product: SmarterMail

Description

CVE-2026-25067 is a medium-severity unauthenticated path coercion vulnerability in SmarterTools SmarterMail versions prior to build 9518. The vulnerability arises because the application base64-decodes attacker-supplied input and uses it as a filesystem path without proper validation. On Windows systems, this allows the resolution of UNC paths, causing the SmarterMail service to initiate outbound SMB authentication attempts to attacker-controlled hosts. This behavior can be exploited for credential coercion, NTLM relay attacks, and unauthorized network authentication. No user interaction or authentication is required to exploit this vulnerability. Although no known exploits are currently reported in the wild, the potential for abuse in network authentication contexts makes it a significant concern. Organizations using vulnerable SmarterMail versions should prioritize patching or mitigating this issue to prevent credential theft and lateral movement risks.

AI-Powered Analysis

AILast updated: 02/05/2026, 08:55:21 UTC

Technical Analysis

CVE-2026-25067 is a vulnerability classified under CWE-706 (Use of Incorrectly-Resolved Name or Reference) affecting SmarterTools SmarterMail versions prior to build 9518. The flaw exists in the background-of-the-day preview endpoint, where the application accepts base64-encoded input from an unauthenticated attacker and decodes it to use as a filesystem path without adequate validation. On Windows platforms, this allows the input to specify UNC (Universal Naming Convention) paths, which triggers the SmarterMail service to initiate outbound SMB (Server Message Block) authentication attempts to attacker-controlled servers. This behavior can be exploited to coerce credentials from the SmarterMail service, enabling NTLM relay attacks or unauthorized network authentication attempts. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, and no privileges or user interaction required. While no public exploits are known, the vulnerability poses a risk of credential theft and lateral movement within enterprise networks, especially those relying on Windows SMB authentication. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for mitigation strategies.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of credentials and unauthorized network authentication attempts, potentially enabling attackers to move laterally within corporate networks. Organizations using SmarterMail on Windows servers are at risk of having their service accounts' NTLM credentials coerced and relayed, which could compromise internal resources and sensitive data. This is particularly concerning for sectors with high-value targets such as finance, government, and critical infrastructure, where lateral movement can lead to significant operational disruption or data breaches. The unauthenticated nature of the exploit increases the risk of widespread scanning and exploitation attempts. Additionally, the outbound SMB authentication attempts could be used to bypass network segmentation or firewall rules if not properly configured. The medium severity rating indicates a moderate but actionable risk that should be addressed promptly to prevent escalation.

Mitigation Recommendations

1. Upgrade SmarterMail to build 9518 or later once the vendor releases a patch addressing this vulnerability. 2. In the interim, restrict outbound SMB (TCP port 445) traffic from SmarterMail servers to untrusted networks to prevent credential coercion to attacker-controlled hosts. 3. Implement network segmentation and firewall rules to limit SMB traffic to only trusted internal hosts. 4. Monitor network logs for unusual outbound SMB authentication attempts originating from SmarterMail servers. 5. Use SMB signing and enforce NTLMv2 to reduce the risk of relay attacks. 6. Consider disabling the background-of-the-day preview feature if it is not essential to reduce the attack surface. 7. Employ endpoint detection and response (EDR) solutions to detect anomalous authentication behaviors. 8. Educate security teams about this vulnerability to ensure rapid response to suspicious activity. These steps go beyond generic advice by focusing on network-level controls and feature-specific mitigations tailored to the vulnerability's exploitation vector.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-28T21:47:35.119Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697ae0284623b1157c685561

Added to database: 1/29/2026, 4:20:56 AM

Last enriched: 2/5/2026, 8:55:21 AM

Last updated: 2/7/2026, 9:17:30 PM

Views: 2749

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats