{"uuid": "c3476725-044f-468f-b424-c1af7d868e89", "vulnerability": {"vulnId": "CVE-2025-52691", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "c3476725-044f-468f-b424-c1af7d868e89"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-01-26T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-01-26T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2026-01-26T00:00:00Z"}, "scope": {"notes": "KEV entry: SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability | Affected: SmarterTools / SmarterMail | Description: SmarterTools SmarterMail contains an unrestricted upload of file with dangerous type vulnerability that could allow an unauthenticated attacker to upload arbitrary files to any location on the mail server, potentially enabling remote code execution. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-02-16 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://www.smartertools.com/smartermail/release-notes/current ; https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-124/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-52691"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-434"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "SmarterMail", "due_date": "2026-02-16", "date_added": "2026-01-26", "vendorProject": "SmarterTools", "vulnerabilityName": "SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-52691", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-52691"}]}
