Cyber Posture

CVE-2020-36926

HighPublic PoC

Published: 16 January 2026

Published
16 January 2026
Modified
09 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0006 18.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2020-36926 is a high-severity Exposure of Sensitive System Information to an Unauthorized Control Sphere (CWE-497) vulnerability in Smartertools Smartertrack. Its CVSS base score is 7.5 (High).

Operationally, ranked at the 18.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-497

Ongoing reviews detect and remove sensitive system information before it reaches publicly accessible systems.

addresses: CWE-497

Employs detection to prevent unauthorized mining of sensitive system information from being exfiltrated to external control spheres.

addresses: CWE-497

Documenting where system information is processed and stored prevents exposure to unauthorized control spheres.

addresses: CWE-497

The control stops sensitive system information from crossing into unauthorized control spheres through EM emanations.

addresses: CWE-497

Authorization and minimization requirements keep PII out of test/research control spheres that often lack production-grade protections.

addresses: CWE-497

Documented categorization of system information reduces the chance that sensitive internals are left exposed to unauthorized spheres.

addresses: CWE-497

System information is concealed or replaced with decoys, reducing leakage to unauthorized observers.

addresses: CWE-497

Ensures sensitive system information is not disclosed outside the intended control sphere through error output.

NVD Description

SmarterTrack 7922 contains an information disclosure vulnerability in the Chat Management search form that reveals agent identification details. Attackers can access the vulnerable /Management/Chat/frmChatSearch.aspx endpoint to retrieve agents' first and last names along with their unique identifiers.

Deeper analysisAI

CVE-2020-36926 is an information disclosure vulnerability in SmarterTrack version 7922. The issue affects the Chat Management search form, accessible via the /Management/Chat/frmChatSearch.aspx endpoint, which exposes agent identification details including first names, last names, and unique identifiers. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and is linked to CWE-497.

Remote, unauthenticated attackers can exploit the vulnerability by directly accessing the affected endpoint over the network with low complexity and no user interaction required. Successful exploitation enables retrieval of sensitive agent personal information, which could facilitate targeted social engineering, phishing, or reconnaissance for subsequent attacks.

References include a proof-of-concept exploit on Exploit-DB (ID 50328), vendor resources from SmarterTools, and an advisory from Vulncheck detailing the SmarterTrack information disclosure. Security practitioners should review these sources for any recommended mitigations, such as endpoint access restrictions or software updates.

Details

CWE(s)

Affected Products

smartertools
smartertrack
10.0, 14.0

CVEs Like This One

CVE-2025-52691Same vendor: Smartertools
CVE-2026-23760Same vendor: Smartertools
CVE-2026-24423Same vendor: Smartertools
CVE-2026-24377Shared CWE-497
CVE-2025-9986Shared CWE-497
CVE-2026-34413Shared CWE-497
CVE-2025-9110Shared CWE-497
CVE-2026-24222Shared CWE-497
CVE-2025-13616Shared CWE-497
CVE-2025-1144Shared CWE-497

References