SmarterTools SmarterMail CVE-2026-7807: Local File Inclusion Exposes Passwords
The National Vulnerability Database has detailed CVE-2026-7807, a high-severity local file inclusion vulnerability impacting SmarterTools SmarterMail builds prior to 9560. This flaw resides in the /api/v1/report/summary/{type} API endpoint, allowing authenticated users to read arbitrary .json files on the system.
The real punch comes when this vulnerability is chained. According to the National Vulnerability Database, attackers can combine the file inclusion with weak encryption algorithms and hardcoded keys to decrypt and access stored passwords and 2FA secrets for all users. This isn’t just about reading logs; it’s a direct path to full account compromise and potentially wider network access. The CVSS score of 8.1 (HIGH) reflects this critical impact, highlighting the potential for complete confidentiality, integrity, and availability compromise.
For defenders, this means a compromised SmarterMail instance could quickly escalate to an organizational breach. The attacker’s calculus here is straightforward: gain initial access, exploit this LFI to dump credentials, and then pivot. The fact that it’s an authenticated user requirement is a minor hurdle when weak credentials or phishing are always in play. This is a critical vector for lateral movement and privilege escalation within an environment.
What This Means For You
- If your organization uses SmarterTools SmarterMail, you need to immediately verify your build version. Any build prior to 9560 is vulnerable. Patch CVE-2026-7807 without delay. After patching, audit for any suspicious access to user accounts or unusual API calls to the `/api/v1/report/summary/{type}` endpoint. Assume credentials may have been compromised and consider a forced password reset for all users, especially if your instance was exposed or unpatched for any period.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
SmarterMail LFI to Credential Access - CVE-2026-7807
title: SmarterMail LFI to Credential Access - CVE-2026-7807
id: scw-2026-05-08-ai-1
status: experimental
level: critical
description: |
Detects the specific Local File Inclusion (LFI) vulnerability in SmarterMail's /api/v1/report/summary/{type} endpoint by looking for requests containing '/api/v1/report/summary/json' and path traversal characters ('..') in the URI query. This is the primary indicator of exploitation for CVE-2026-7807, which can lead to the exposure of sensitive user credentials.
author: SCW Feed Engine (AI-generated)
date: 2026-05-08
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7807/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/api/v1/report/summary/json'
cs-uri-query|contains:
- '..'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7807 | Local File Inclusion | SmarterTools SmarterMail builds prior to 9560 |
| CVE-2026-7807 | Local File Inclusion | /api/v1/report/summary/{type} API endpoint |
| CVE-2026-7807 | Information Disclosure | Access to stored passwords and 2FA secrets |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 08, 2026 at 23:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.