SmarterTools SmarterMail CVE-2026-7807: Local File Inclusion Exposes Passwords

SmarterTools SmarterMail CVE-2026-7807: Local File Inclusion Exposes Passwords

The National Vulnerability Database has detailed CVE-2026-7807, a high-severity local file inclusion vulnerability impacting SmarterTools SmarterMail builds prior to 9560. This flaw resides in the /api/v1/report/summary/{type} API endpoint, allowing authenticated users to read arbitrary .json files on the system.

The real punch comes when this vulnerability is chained. According to the National Vulnerability Database, attackers can combine the file inclusion with weak encryption algorithms and hardcoded keys to decrypt and access stored passwords and 2FA secrets for all users. This isn’t just about reading logs; it’s a direct path to full account compromise and potentially wider network access. The CVSS score of 8.1 (HIGH) reflects this critical impact, highlighting the potential for complete confidentiality, integrity, and availability compromise.

For defenders, this means a compromised SmarterMail instance could quickly escalate to an organizational breach. The attacker’s calculus here is straightforward: gain initial access, exploit this LFI to dump credentials, and then pivot. The fact that it’s an authenticated user requirement is a minor hurdle when weak credentials or phishing are always in play. This is a critical vector for lateral movement and privilege escalation within an environment.

What This Means For You

  • If your organization uses SmarterTools SmarterMail, you need to immediately verify your build version. Any build prior to 9560 is vulnerable. Patch CVE-2026-7807 without delay. After patching, audit for any suspicious access to user accounts or unusual API calls to the `/api/v1/report/summary/{type}` endpoint. Assume credentials may have been compromised and consider a forced password reset for all users, especially if your instance was exposed or unpatched for any period.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

SmarterMail LFI to Credential Access - CVE-2026-7807

Sigma YAML — free preview
title: SmarterMail LFI to Credential Access - CVE-2026-7807
id: scw-2026-05-08-ai-1
status: experimental
level: critical
description: |
  Detects the specific Local File Inclusion (LFI) vulnerability in SmarterMail's /api/v1/report/summary/{type} endpoint by looking for requests containing '/api/v1/report/summary/json' and path traversal characters ('..') in the URI query. This is the primary indicator of exploitation for CVE-2026-7807, which can lead to the exposure of sensitive user credentials.
author: SCW Feed Engine (AI-generated)
date: 2026-05-08
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-7807/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: webserver
detection:
  selection:
      cs-uri|contains:
          - '/api/v1/report/summary/json'
      cs-uri-query|contains:
          - '..'
      condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-7807 Local File Inclusion SmarterTools SmarterMail builds prior to 9560
CVE-2026-7807 Local File Inclusion /api/v1/report/summary/{type} API endpoint
CVE-2026-7807 Information Disclosure Access to stored passwords and 2FA secrets
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 08, 2026 at 23:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-6667 — PgBouncer before 1.25.2 did not perform an appropriate

CVE-2026-6667 — PgBouncer before 1.25.2 did not perform an appropriate authorization check for the KILL_CLIENT admin command. All users with access to the administration console...

vulnerabilityCVEmedium-severitycwe-862
/SCW Vulnerability Desk /MEDIUM /4.3 /⚑ 2 IOCs /⚙ 2 Sigma

CVE-2026-6666 — A possible null pointer reference in PgBouncer before

CVE-2026-6666 — A possible null pointer reference in PgBouncer before 1.25.2 could lead to a crash, if a server sends an error response without SQLSTATE...

vulnerabilityCVEmedium-severitycwe-476
/SCW Vulnerability Desk /MEDIUM /5.9 /⚑ 2 IOCs /⚙ 1 Sigma

PgBouncer SCRAM Vulnerability (CVE-2026-6665) Allows Stack Overflow

CVE-2026-6665 — The SCRAM code in PgBouncer before 1.25.2 did not check the return value of strlcat() correctly when building the contents of the SCRAM...

vulnerabilityCVEhigh-severitycwe-121
/SCW Vulnerability Desk /HIGH /8.1 /⚑ 4 IOCs /⚙ 2 Sigma