PT-2025-53686 · Smartertools · Smartermail
Chua Meng Han
·
Published
2025-12-29
·
Updated
2026-03-04
·
CVE-2025-52691
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
SmarterTools SmarterMail versions prior to Build 9413
SmarterTools SmarterMail version 9406
SmarterTools SmarterMail versions prior to Build 9406
SmarterTools SmarterMail versions prior to 9518
Description
SmarterTools SmarterMail is affected by a critical vulnerability (CVE-2025-52691) that allows unauthenticated attackers to upload arbitrary files to any location on the mail server. Successful exploitation of this vulnerability could lead to remote code execution (RCE), potentially enabling full server compromise, data theft, and ransomware attacks. The vulnerability is related to a flaw in the
/api/upload endpoint where the guid parameter within contextData allows for path traversal. Over 8,000 internet-exposed SmarterMail servers were reported as vulnerable as of January 12, 2026, and public proof-of-concept (PoC) exploits are available. Threat actors are actively scanning for vulnerable instances and compiling target lists. The Singapore Cyber Security Agency (CSA) has issued a high-severity alert regarding this vulnerability.Recommendations
Upgrade SmarterTools SmarterMail to Build 9413 or later.
Upgrade SmarterTools SmarterMail to Build 9483.
Upgrade SmarterTools SmarterMail to Build 9518.
Exploit
Fix
RCE
Unrestricted File Upload
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
CVE-2025-52691
Affected Products
Smartermail
References · 135
- 🔥 https://github.com/watchtowrlabs/watchTowr-vs-SmarterMail-CVE-2025-52691?ref=labs.watchtowr.com⭐ 15 🔗 1 · Exploit
- https://csa.gov.sg/alerts-and-advisories/alerts/al-2025-124 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-52691 · Security Note
- https://smartertools.com/smartermail/release-notes/current · Security Note
- https://twitter.com/arnavsharma/status/2006157131305844991 · Twitter Post
- https://twitter.com/pdnuclei_bot/status/2009429948763918515 · Twitter Post
- https://twitter.com/cybernewslive/status/2006158286069137561 · Twitter Post
- https://twitter.com/pentest_swissky/status/2023876861600936391 · Twitter Post
- https://twitter.com/AnonNews_irc/status/2006114519198621888 · Twitter Post
- https://twitter.com/0dayPublishing/status/2005472768888901917 · Twitter Post
- https://twitter.com/UndercodeNews/status/2005970779041861644 · Twitter Post
- https://twitter.com/TheHackerWire/status/2005478917881377015 · Twitter Post
- https://twitter.com/rst_cloud/status/2012101228981854266 · Twitter Post
- https://twitter.com/TweetThreatNews/status/2006115623642759472 · Twitter Post
- https://twitter.com/ET_Labs/status/2011195020154663069 · Twitter Post