Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

8000+ SmarterMail Hosts Vulnerable to RCE Attack

Posted on January 13, 2026January 13, 2026 By CWS

Over 8,000 internet-exposed SmarterMail servers stay susceptible to a essential distant code execution flaw tracked as CVE-2025-52691, in line with scans performed on January 12, 2026.

Safety researchers recognized 8,001 distinctive IP addresses seemingly affected out of 18,783 uncovered cases, with proof-of-concept exploits now publicly obtainable. This maximum-severity vulnerability poses extreme dangers to organizations counting on the e-mail platform for enterprise communications.​

CVE-2025-52691 stems from an unauthenticated arbitrary file add flaw in SmarterMail variations Construct 9406 and earlier. Attackers can add malicious recordsdata to any server location with out credentials, enabling distant code execution below the service’s privileges.

The Nationwide Vulnerability Database (NVD) assigns it a CVSS v3.1 rating of 10.0 with the vector AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H, marking it as critically exploitable over the community with low complexity.

DetailInformationCVE IDCVE-2025-52691 ​DescriptionUnauthenticated arbitrary file add resulting in RCE ​CVSS Score10.0 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) ​Affected VersionsSmarterMail Construct 9406 and earlier ​Fastened VersionBuild 9413 and later ​CWECWE-434 (Unrestricted Add of File with Harmful Kind) ​

Profitable exploitation permits full server compromise, knowledge exfiltration, webshell deployment, or lateral motion. Disclosed in late December 2025, the flaw prompted alerts from companies together with Singapore’s Cyber Safety Company (CSA) and Belgium’s CCB.x+3​

Shadowserver UK’s newest dashboard reveals widespread publicity, with america internet hosting round 5,000 susceptible cases, adopted by the UK and Malaysia.

Scans affirm 42.6% of uncovered SmarterMail hosts (8,001/18,783) fail vulnerability checks, seemingly attributable to delayed patching. Censys reported related figures earlier, noting over 16,000 uncovered globally, predominantly within the US (12,500+).

Public PoCs on platforms like Sploitus display easy HTTP requests for file uploads, escalating to RCE through ASPX webshells. No widespread in-the-wild exploitation is confirmed but, however the public exploits heighten dangers for unpatched mail servers instantly internet-facing.

Directors should improve to SmarterMail Construct 9413 or later, ideally the most recent Construct 9483, for remediation. Interim steps embrace limiting exterior entry to admin interfaces, monitoring logs for anomalous uploads, and scanning for IOCs like surprising recordsdata in executable directories.

Organizations ought to confirm publicity through instruments like Shadowserver reviews and prioritize electronic mail infrastructure in patch administration.

This vulnerability underscores the risks of unpatched electronic mail servers, doubtlessly enabling spam relays, phishing bases, or ransomware vectors. With CVSS perfection and straightforward exploits, speedy motion is important to avert breaches.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attack, Hosts, RCE, SmarterMail, Vulnerable

Post navigation

Previous Post: Anthropic Unveils “Claude for Healthcare” to Help Users Understand Medical Records
Next Post: FortiOS and FortiSwitchManager Vulnerability Let Remote Attackers Execute Arbitrary Code

Related Posts

CISA Warns of Citrix NetScaler ADC and Gateway Vulnerability Actively Exploited in Attacks Cyber Security News
Top 5 Best Cybersecurity Companies Leading The Industry Right Now in 2025 Cyber Security News
New DroidLock Malware Locks Android Devices and Demands a Ransom Cyber Security News
Laundry Bear Infrastructure, Key Tactics and Procedures Uncovered Cyber Security News
Hackers Use Rogue MCP Server to Inject Malicious Code to Control Over Cursor’s Built-in Browser Cyber Security News
Scattered Spider Upgraded Their Tactics to Abuse Legitimate Tools to Evade Detection and Maintain Persistence Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CrowdStrike to Acquire Browser Security Firm Seraphic for $420 Million
  • Microsoft Patches Exploited Windows Zero-Day, 111 Other Vulnerabilities
  • Microsoft Patch Tuesday January 2026
  • FortiSandbox SSRF Vulnerability Allow Attacker to proxy Internal Traffic via Crafted HTTP Requests
  • Node.js Security Release Patches 7 Vulnerabilities Across All Release Lines

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CrowdStrike to Acquire Browser Security Firm Seraphic for $420 Million
  • Microsoft Patches Exploited Windows Zero-Day, 111 Other Vulnerabilities
  • Microsoft Patch Tuesday January 2026
  • FortiSandbox SSRF Vulnerability Allow Attacker to proxy Internal Traffic via Crafted HTTP Requests
  • Node.js Security Release Patches 7 Vulnerabilities Across All Release Lines

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark