Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

8000+ SmarterMail Hosts Vulnerable to RCE Attack

Posted on January 13, 2026January 13, 2026 By CWS

Over 8,000 internet-exposed SmarterMail servers stay susceptible to a essential distant code execution flaw tracked as CVE-2025-52691, in line with scans performed on January 12, 2026.

Safety researchers recognized 8,001 distinctive IP addresses seemingly affected out of 18,783 uncovered cases, with proof-of-concept exploits now publicly obtainable. This maximum-severity vulnerability poses extreme dangers to organizations counting on the e-mail platform for enterprise communications.​

CVE-2025-52691 stems from an unauthenticated arbitrary file add flaw in SmarterMail variations Construct 9406 and earlier. Attackers can add malicious recordsdata to any server location with out credentials, enabling distant code execution below the service’s privileges.

The Nationwide Vulnerability Database (NVD) assigns it a CVSS v3.1 rating of 10.0 with the vector AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H, marking it as critically exploitable over the community with low complexity.

DetailInformationCVE IDCVE-2025-52691 ​DescriptionUnauthenticated arbitrary file add resulting in RCE ​CVSS Score10.0 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) ​Affected VersionsSmarterMail Construct 9406 and earlier ​Fastened VersionBuild 9413 and later ​CWECWE-434 (Unrestricted Add of File with Harmful Kind) ​

Profitable exploitation permits full server compromise, knowledge exfiltration, webshell deployment, or lateral motion. Disclosed in late December 2025, the flaw prompted alerts from companies together with Singapore’s Cyber Safety Company (CSA) and Belgium’s CCB.x+3​

Shadowserver UK’s newest dashboard reveals widespread publicity, with america internet hosting round 5,000 susceptible cases, adopted by the UK and Malaysia.

Scans affirm 42.6% of uncovered SmarterMail hosts (8,001/18,783) fail vulnerability checks, seemingly attributable to delayed patching. Censys reported related figures earlier, noting over 16,000 uncovered globally, predominantly within the US (12,500+).

Public PoCs on platforms like Sploitus display easy HTTP requests for file uploads, escalating to RCE through ASPX webshells. No widespread in-the-wild exploitation is confirmed but, however the public exploits heighten dangers for unpatched mail servers instantly internet-facing.

Directors should improve to SmarterMail Construct 9413 or later, ideally the most recent Construct 9483, for remediation. Interim steps embrace limiting exterior entry to admin interfaces, monitoring logs for anomalous uploads, and scanning for IOCs like surprising recordsdata in executable directories.

Organizations ought to confirm publicity through instruments like Shadowserver reviews and prioritize electronic mail infrastructure in patch administration.

This vulnerability underscores the risks of unpatched electronic mail servers, doubtlessly enabling spam relays, phishing bases, or ransomware vectors. With CVSS perfection and straightforward exploits, speedy motion is important to avert breaches.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attack, Hosts, RCE, SmarterMail, Vulnerable

Post navigation

Previous Post: Anthropic Unveils “Claude for Healthcare” to Help Users Understand Medical Records
Next Post: After Goldman, JPMorgan Discloses Law Firm Data Breach

Related Posts

Shuyal Stealer Attacking 19 Browsers to Steal Login Credentials Cyber Security News
87,000+ MongoDB Instances Vulnerable to MongoBleed Flaw Exposed Online Cyber Security News
10 Best ZTNA Solutions (Zero Trust Network Access) in 2025 Cyber Security News
Microsoft Unveils New Tool to Migrate VMware Virtual Machines From vCenter to Hyper-V Cyber Security News
Senate Investigates Cisco Over Zero-Day Firewall Vulnerabilities Cyber Security News
Hackers Compromise Active Directory to Steal NTDS.dit that Leads to Full Domain Compromise Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Patches Exploited Windows Zero-Day, 111 Other Vulnerabilities
  • Microsoft Patch Tuesday January 2026
  • FortiSandbox SSRF Vulnerability Allow Attacker to proxy Internal Traffic via Crafted HTTP Requests
  • Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages
  • Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Patches Exploited Windows Zero-Day, 111 Other Vulnerabilities
  • Microsoft Patch Tuesday January 2026
  • FortiSandbox SSRF Vulnerability Allow Attacker to proxy Internal Traffic via Crafted HTTP Requests
  • Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages
  • Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark