CVE-2026-24423

Scores

EPSS

0.803high80.3%
0%20%40%60%80%100%

Percentile: 80.3%

CVSS

9.3critical4.0
0246810

CVSS Score: 9.3/10

All CVSS Scores

CVSS 4.0
9.3

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Description

SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-306

Related Vulnerabilities

Exploits

Exploit ID: CVE-2026-24423

Source: github-poc

URL: https://github.com/aavamin/CVE-2026-24423

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: smartermail

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:smartertools:smartermail:*:*:*:*:*:*:*:*",      "versionEndExcluding": "100.0.9511",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

End of list