Critical Vulnerabilities in IBM API Connect and SmarterMail Exposed

SmarterMail vulnerability CVE-2025-52691 critical vulnerability email server security remote code execution SmarterTools security update cybersecurity threats
Brandon Woo
Brandon Woo

System Architect

 
December 31, 2025
4 min read
Critical Vulnerabilities in IBM API Connect and SmarterMail Exposed

TL;DR

  • This article details a critical SmarterMail vulnerability, CVE-2025-52691, discovered by Mr Chua Meng Han. With a CVSS score of 10.0, it allows unauthenticated attackers to upload files and execute remote code, potentially compromising mail servers. SmarterTools has released Build 9413 to fix this; immediate patching is strongly advised for all affected versions.

SmarterMail Critical Vulnerability

SmarterTools has released a security update for SmarterMail to address a critical vulnerability. The flaw carries a maximum severity rating, posing a significant risk to organizations. Immediate patching is strongly advised.

  • The vulnerability is identified as CVE-2025-52691.
  • It was discovered by security researcher Mr Chua Meng Han from the Centre for Strategic Infocomm Technologies (CSIT).
  • The vulnerability received a critical CVSS 3.1 score of 10.0, indicating maximum severity.
  • An unauthenticated attacker can exploit this vulnerability to upload arbitrary files to any location on a SmarterMail server.
  • This can lead to remote code execution, potentially granting attackers complete control over affected mail servers.
  • Consequences include unauthorized access to sensitive email, malware installation, credential theft, and lateral movement.

Affected Versions and Mitigation

SmarterMail versions before Build 9406 are vulnerable and should be updated immediately.

  • Administrators can check their current version in the SmarterMail administrative console.
  • SmarterTools has released Build 9413, which includes the security fix.
  • Organizations should prioritize patching internet-facing mail servers.
  • SmarterTools collaborated with the Cyber Security Agency (CSA) on coordinated vulnerability disclosure.

Patching Steps

  1. Identify all SmarterMail installations.
  2. Verify current software versions.
  3. Test the Build 9413 update in a non-production environment.
  4. Deploy updates across all affected systems.
  5. Monitor server logs for suspicious activity.

CISA Vulnerability Summary

The CISA Vulnerability Bulletin (Common Vulnerabilities and Exposures) provides a summary of new vulnerabilities recorded in the past week, organized according to severity based on the Common Vulnerability Scoring System (CVSS) standard.

  • High: CVSS base score of 7.0–10.0
  • Medium: CVSS base score of 4.0–6.9
  • Low: CVSS base score of 0.0–3.9

High Vulnerabilities

Several high-severity vulnerabilities have been identified across various products:

IBM Security Vulnerabilities

Multiple vulnerabilities have been addressed in IBM API Connect. Additionally, IBM App Connect Enterprise and IBM Integration Bus are vulnerable to remote attackers due to multiple jsonwebtoken CVEs. The resolving fix includes jsonwebtoken version 9.0.0.

These vulnerabilities highlight the need for a robust cybersecurity architecture. Gopher Security specializes in AI-powered, post-quantum Zero-Trust cybersecurity. Our platform converges networking and security across devices, apps, and environments—from endpoints and private networks to cloud, remote access, and containers—using peer-to-peer encrypted tunnels and quantum-resistant cryptography.

Explore our services and contact us at Gopher Security to learn more about how we can protect your organization.

Brandon Woo
Brandon Woo

System Architect

 

10-year experience in enterprise application development. Deep background in cybersecurity. Expert in system design and architecture.

Related News

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits
vulnerability exploits

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits

Vulnerability exploits now account for 40% of cyber intrusions, surpassing phishing. Learn how shrinking patch windows and edge device targets are changing security.

By Brandon Woo April 6, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026
cybersecurity trends 2026

Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026

Vulnerability exploits now drive 40% of cyberattacks as hackers weaponize flaws within hours. Learn why traditional patching is failing and how to adapt. Read more.

By Divyansh Ingle March 30, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions
Vulnerability Exploitation

Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions

Hackers are weaponizing zero-days within hours of disclosure, leaving traditional patch cycles in the dust. Learn how to bridge the security gap with MFA and Zero-Trust.

By Alan V Gutnov March 23, 2026 4 min read
common.read_full_article
Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends

Exploits are the leading cause of cyber intrusions, outpacing phishing. Discover the latest trends and essential strategies to protect your organization. Read now!

By Brandon Woo March 16, 2026 3 min read
common.read_full_article