Back to News
vulnerability🌐InternationalThe Hacker News

CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution

Tuesday, December 30, 2025

CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution

What

This critical flaw enables unauthenticated attackers to upload arbitrary files, including malicious binaries or web shells, to a mail server. Successful exploitation grants remote code execution with the same privileges as the SmarterMail service, posing a significant threat to affected organizations.

Where

SmarterTools SmarterMail email software, used by web hosting providers like ASPnix Web Hosting, Hostek, and simplehosting.ch.

When

Disclosed by CSA Singapore, patched on October 9, 2025 (Build 9413), with a newer update on December 18, 2025 (Build 9483).

Key Factors

  • The vulnerability, CVE-2025-52691, is an arbitrary file upload flaw in SmarterTools SmarterMail that achieves remote code execution without requiring any authentication.
  • With a CVSS score of 10.0, this flaw allows an unauthenticated attacker to upload dangerous file types like PHP files or web shells to any location on the mail server.
  • Exploitation could lead to the execution of malicious binaries or web shells with the same privileges as the SmarterMail service, enabling full system compromise.

Takeaways

  • Immediately update SmarterTools SmarterMail installations to Build 9413 or the latest Build 9483 to patch CVE-2025-52691.
  • Organizations using SmarterMail should review server logs for suspicious file uploads or unexpected process executions as a precautionary measure.
Read Full Article

Opens original article on The Hacker News

Similar News