Critical Vulnerabilities in IBM API Connect and SmarterMail Exposed

SmarterMail vulnerability CVE-2025-52691 critical vulnerability email server security remote code execution SmarterTools security update cybersecurity threats
Brandon Woo
Brandon Woo

System Architect

 
December 31, 2025 4 min read
Critical Vulnerabilities in IBM API Connect and SmarterMail Exposed

TL;DR

This article details a critical SmarterMail vulnerability, CVE-2025-52691, discovered by Mr Chua Meng Han. With a CVSS score of 10.0, it allows unauthenticated attackers to upload files and execute remote code, potentially compromising mail servers. SmarterTools has released Build 9413 to fix this; immediate patching is strongly advised for all affected versions.

SmarterMail Critical Vulnerability

SmarterTools has released a security update for SmarterMail to address a critical vulnerability. The flaw carries a maximum severity rating, posing a significant risk to organizations. Immediate patching is strongly advised.

  • The vulnerability is identified as CVE-2025-52691.
  • It was discovered by security researcher Mr Chua Meng Han from the Centre for Strategic Infocomm Technologies (CSIT).
  • The vulnerability received a critical CVSS 3.1 score of 10.0, indicating maximum severity.
  • An unauthenticated attacker can exploit this vulnerability to upload arbitrary files to any location on a SmarterMail server.
  • This can lead to remote code execution, potentially granting attackers complete control over affected mail servers.
  • Consequences include unauthorized access to sensitive email, malware installation, credential theft, and lateral movement.

Affected Versions and Mitigation

SmarterMail versions before Build 9406 are vulnerable and should be updated immediately.

  • Administrators can check their current version in the SmarterMail administrative console.
  • SmarterTools has released Build 9413, which includes the security fix.
  • Organizations should prioritize patching internet-facing mail servers.
  • SmarterTools collaborated with the Cyber Security Agency (CSA) on coordinated vulnerability disclosure.

Patching Steps

  1. Identify all SmarterMail installations.
  2. Verify current software versions.
  3. Test the Build 9413 update in a non-production environment.
  4. Deploy updates across all affected systems.
  5. Monitor server logs for suspicious activity.

CISA Vulnerability Summary

The CISA Vulnerability Bulletin (Common Vulnerabilities and Exposures) provides a summary of new vulnerabilities recorded in the past week, organized according to severity based on the Common Vulnerability Scoring System (CVSS) standard.

  • High: CVSS base score of 7.0–10.0
  • Medium: CVSS base score of 4.0–6.9
  • Low: CVSS base score of 0.0–3.9

High Vulnerabilities

Several high-severity vulnerabilities have been identified across various products:

IBM Security Vulnerabilities

Multiple vulnerabilities have been addressed in IBM API Connect. Additionally, IBM App Connect Enterprise and IBM Integration Bus are vulnerable to remote attackers due to multiple jsonwebtoken CVEs. The resolving fix includes jsonwebtoken version 9.0.0.

These vulnerabilities highlight the need for a robust cybersecurity architecture. Gopher Security specializes in AI-powered, post-quantum Zero-Trust cybersecurity. Our platform converges networking and security across devices, apps, and environments—from endpoints and private networks to cloud, remote access, and containers—using peer-to-peer encrypted tunnels and quantum-resistant cryptography.

Explore our services and contact us at Gopher Security to learn more about how we can protect your organization.

Brandon Woo
Brandon Woo

System Architect

 

10-year experience in enterprise application development. Deep background in cybersecurity. Expert in system design and architecture.

Related News

React2Shell CVE-2025-55182: Max-Severity Threat to JavaScript
n8n vulnerability

React2Shell CVE-2025-55182: Max-Severity Threat to JavaScript

Discover critical n8n and React2Shell vulnerabilities impacting thousands. Learn about RCE exploits, affected systems, and essential patching steps. Secure your network now!

By Edward Zhou January 9, 2026 4 min read
Read full article
Unlocking LockBit 5.0: Enhanced Encryption and Targeted Threats
LockBit 5.0

Unlocking LockBit 5.0: Enhanced Encryption and Targeted Threats

Discover the latest LockBit 5.0 ransomware evolution, its cross-platform capabilities, and advanced evasion tactics. Secure your defenses now!

By Divyansh Ingle January 8, 2026 4 min read
Read full article
CISA's KEV Catalog Grows by 1,484 Vulnerabilities in 2025
CISA KEV Catalog

CISA's KEV Catalog Grows by 1,484 Vulnerabilities in 2025

CISA's KEV Catalog grew to 1,484 with 245 new vulnerabilities in 2025. Learn which are actively exploited and how to protect your organization. Explore now!

By Divyansh Ingle January 7, 2026 7 min read
Read full article
Eaton UPS Software Vulnerabilities Allow Code Execution Risks
Eaton UPS Companion vulnerabilities

Eaton UPS Software Vulnerabilities Allow Code Execution Risks

Critical vulnerabilities found in Eaton UPS Companion software. High risk of code execution. Update to v3.0 now to protect your systems!

By Edward Zhou January 6, 2026 3 min read
Read full article