Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical SandboxJS Escape Vulnerability Allows Host Takeover
May 13, 2026
iOS 26.5 Brings End-to-end Encrypted RCS Messaging Between iPhone
May 13, 2026
Critical Exim BDAT GnuTLS Flaw Vulnerability Enables
May 13, 2026
Home/CyberSecurity News/SmarterMail RCE Vulnerability: PoC Released SmarterTools Enables
CyberSecurity News

SmarterMail RCE Vulnerability: PoC Released SmarterTools Enables

A critical pre-authentication remote code execution (RCE) vulnerability has been discovered in SmarterTools’ SmarterMail solution. This flaw is identified as CVE-2025-52691. The flaw received a...

David kimber
David kimber
January 9, 2026 2 Min Read
5 0

A critical pre-authentication remote code execution (RCE) vulnerability has been discovered in SmarterTools’ SmarterMail solution. This flaw is identified as CVE-2025-52691.

The flaw received a maximum CVSS score of 10.0, indicating its severe nature and potential impact on affected systems.

SmarterTools describes SmarterMail as “a secure, all-in-one business email and collaboration server for Windows and Linux – an affordable Microsoft Exchange alternative.” The platform is widely used by organizations seeking email server solutions.

CVE ID CVSS Score Vulnerability Type Affected Versions
CVE-2025-52691 10.0 (Critical) Pre-Authentication Remote Code Execution Build 9406 and earlier

SmarterMail RCE-vulnerability”>SmarterTools SmarterMail RCE Vulnerability

Security researchers at Singapore’s Centre for Strategic Infocomm Technologies (CSIT) discovered the vulnerability, which exploits an unauthenticated file-upload endpoint in the application.

notification of vulnerability
notification of vulnerability

The flaw exists in the /api/upload route, specifically within the FileUploadController.Upload method that requires no authentication to access.

The vulnerability leverages a path traversal weakness in the GUID parameter validation.

Attackers can manipulate the contextData parameter to include a malicious GUID value, thereby bypassing the restricted upload directory and writing arbitrary files to any location on the system, including web-accessible directories.

By crafting a specially formatted multipart/form-data HTTP request with path traversal sequences.

path traversal exploit
path traversal exploit

Threat actors can upload malicious ASPX webshells to the server’s root directory, achieving complete remote code execution without authentication.

The vulnerability was silently fixed in build 9413, released on October 10, 2025. However, the official advisory from Singapore’s Cyber Security Agency (CSA) wasn’t published until late December 2025.

This three-month gap raised concerns about silent patching practices, as customers remained unaware of the critical vulnerability for approximately 2.5 months after the fix was deployed.

WatchTowr Labs has released a Detection Artifact Generator on GitHub to help organizations identify their exposure and build detection rulesets.

security fixes
security fixes

The tool has been verified on both Windows installations with newer builds and older versions.

Organizations running SmarterMail should immediately update to build 9413 or later to protect against potential exploitation of this critical vulnerability.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

New Ghost Tapped Attack Drains Your Android Bank Account

Next Post

Hackers Exploiting AI Deployments: 91, Actively Attack

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Discover the Top 10 Best Data Loss Prevention Software
May 13, 2026
Microsoft Teams Vulnerability Enables Spoofing Attacks
May 13, 2026
Microsoft Patch Tuesday May 2026: Vulnerabilities Fixed
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us