[KIS-2026-04] SmarterMail <= 9518 (MailboxId) Reflected Cross-Site Scripting Vulnerability
嗯,用户发来一个请求,让我帮他总结一篇文章的内容,控制在一百个字以内,而且不需要特定的开头。首先,我需要仔细阅读用户提供的文章内容。 文章看起来是一个漏洞公告,关于SmarterMail软件的反射型跨站脚本(XSS)漏洞。漏洞影响版本是Build 9518及之前版本。问题出在MailboxId GET参数没有被正确清理,导致生成HTML输出时存在XSS风险。攻击者可以利用这一点进行XSS攻击,甚至可能引发远程命令执行(RCE)。修复方法是升级到9526或更高版本。 接下来,我需要将这些关键信息浓缩到100字以内。要包含软件名称、漏洞类型、影响版本、问题原因、攻击后果以及修复措施。同时,要确保语言简洁明了,直接描述内容,不需要额外的开头语。 可能会遇到的问题是如何在有限的字数内涵盖所有重要点。可能需要舍弃一些细节,比如披露时间线和CVE编号等,因为这些可能不是用户最关心的部分。 最后,检查一下字数是否符合要求,并确保信息准确无误。 </think> SmarterMail版本9518及以下存在反射型跨站脚本(XSS)漏洞,源于未对"MailboxId"参数进行充分过滤。攻击者可借此发起XSS攻击,并可能引发远程命令执行。建议升级至9526或更高版本修复此问题。 2026-2-22 18:3:11 Author: seclists.org(查看原文) 阅读量:0 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: Egidio Romano <n0b0d13s () gmail com>
Date: Mon, 16 Feb 2026 23:32:17 +0100

----------------------------------------------------------------------------
SmarterMail <= 9518 (MailboxId) Reflected Cross-Site Scripting Vulnerability
----------------------------------------------------------------------------


[-] Software Link:

https://www.smartertools.com/smartermail/business-email-server


[-] Affected Versions:

Build 9518 and prior builds.


[-] Vulnerability Description:

User input passed through the "MailboxId" GET parameter to the MAPI
endpoints is not properly sanitized before being used to generate HTML
output. This can be exploited by attackers to perform Reflected Cross-Site
Scripting (XSS) attacks which, in turn, might lead to 1-click Remote
Command Execution (RCE) attacks.


[-] Proof of Concept:

https://karmainsecurity.com/pocs/CVE-2026-26930.html


[-] Solution:

Upgrade to build 9526 or later.


[-] Disclosure Timeline:

[26/01/2026] - Vendor notified

[26/01/2026] - Vendor response stating "we will get this over to the
developers for evaluation"

[30/01/2026] - Vendor released build 9526

[03/02/2026] - CVE identifier requested

[16/02/2026] - CVE identifier assigned

[16/02/2026] - Public disclosure


[-] CVE Reference:

The Common Vulnerabilities and Exposures project (cve.org) has assigned the
name CVE-2026-26930 to this vulnerability.


[-] Credits:

Vulnerability discovered by Egidio Romano.


[-] Original Advisory:

https://karmainsecurity.com/KIS-2026-04
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/


Current thread:

  • [KIS-2026-04] SmarterMail <= 9518 (MailboxId) Reflected Cross-Site Scripting Vulnerability Egidio Romano (Feb 22)

文章来源: https://seclists.org/fulldisclosure/2026/Feb/30
如有侵权请联系:admin#unsafe.sh