CVE-2025-52691 is a critical vulnerability in SmarterTools SmarterMail that allows an unauthenticated attacker to upload arbitrary files to arbitrary locations on the mail server, potentially enabling remote code execution. While there hasn’t been reports of active exploitation, the ease of exploit, prevalence of internet-exposed instances, and seriousness and likelihood of full compromise upon an attack make finding and addressing risk highly urgent for organizations leveraging this tool.
SmarterMail builds 9406 and earlier are affected, and SmarterTools released a fix in Build 9413; more recent builds will also include the patch.
The SmarterTools SmarterMail Rapid Response test (CVE-2025-52691) released Jan. 12, 2026 enables customers to safely verify whether SmarterMail instances are exploitable to this unauthenticated file upload flaw (and therefore susceptible to full compromise) and to confirm remediation.
If the Rapid Response test confirms exploitability, treat the host as potentially compromised, preserve relevant logs, isolate the system, and engage incident response.
| Indicator | Type | Description / detection tips |
| Unusual HTTP(S) requests to SmarterMail web interface | Network / Web | Look for spikes in requests, suspicious multipart/form-data uploads, or anomalous user agents from unknown sources near the time of suspected activity. |
| Unexpected file creation under SmarterMail install paths or web-accessible directories | Host / File | Alert on new or modified files in directories served by the SmarterMail web app and on unexpected writes by the SmarterMail service account. |
| Web process spawning unusual child processes | Host / Behavior | Watch for unexpected child processes from the SmarterMail web worker / service processes (for example shells, scripting engines, or binary execution). |
| New scheduled tasks, services, or persistence artifacts shortly after suspicious web activity | Host / Persistence | Correlate persistence creation with prior anomalous web requests and file write events. |
| Anomalous outbound connections from the mail server | Network | Look for new egress destinations, beaconing patterns, or outbound data transfers following suspicious web activity. |
🔗 Censys advisory (Dec 30, 2025)
🔗 CSA Alert AL-2025-124 (Vulnerability in SmarterTools Software)
🔗 The Hacker News coverage (Dec 30, 2025)
🔗 CCB Belgium advisory (Dec 29, 2025)
The NodeZero® platform empowers your organization to reduce your security risks by autonomously finding exploitable weaknesses in your network, giving you detailed guidance around how to priortize and fix them, and having you immediately verify that your fixes are effective.