CVE-2025-59689
Published Sep 19, 2025
Last updated 4 months ago
- Description
- Libraesva ESG 4.5 through 5.5.x before 5.5.7 allows command injection via a compressed e-mail attachment. For ESG 5.0 a fix has been released in 5.0.31. For ESG 5.1 a fix has been released in 5.1.20. For ESG 5.2 a fix has been released in 5.2.31. For ESG 5.4 a fix has been released in 5.4.8. For ESG 5.5. a fix has been released in 5.5.7.
- Source
- cve@mitre.org
- NVD status
- Analyzed
- Products
- email_security_gateway
CVSS 3.1
- Type
- Secondary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
Data from CISA
- Vulnerability name
- Libraesva Email Security Gateway Command Injection Vulnerability
- Exploit added on
- Sep 29, 2025
- Exploit action due
- Oct 20, 2025
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- cve@mitre.org
- CWE-77
- Hype score
- Not currently trending
Libraesva Email Security Gateway Vulnerability Exploited by Nation-State Hackers Tracked as CVE-2025-59689, the command injection bug could be triggered via malicious emails containing crafted compressed attachments. The post Libraesva Email Security Gateway Vulnerability Exp...
@SecurityAid
24 Jan 2026
96 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Latest Known Exploited Vulnerabilities (#KEV) : #CVE-2025-59689 #Libraesva Email Security Gateway Command Injection Vulnerability https://t.co/YIFBX5tnPE
@ScyScan
29 Sept 2025
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
NATION-STATE ALERT! Spies are exploiting the Libraesva ESG Zero-Day (CVE-2025-59689) to compromise email systems globally. If you use Libraesva, your sensitive communications are being stolen. Full report on - https://t.co/xJSUhbz5TF https://t.co/rXVhdVRlSy
@cyberbivash
28 Sept 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐ Los piratas informรกticos patrocinados por el Estado explotaron una vulnerabilidad, identificada como CVE-2025-59689, en #Libraesva Email Gateway a travรฉs de archivos adjuntos maliciosos. #QintegraNews #ciberseguridad @securityaffairs https://t.co/IYETGYMZiB
@QintegraC
26 Sept 2025
36 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-59689
@transilienceai
26 Sept 2025
21 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Libraesva has patched a critical command injection vulnerability (CVE-2025-59689) in its Email Security Gateway with a CVSS score of 6.1, used by threat actors. Attackers exploit this flaw via malicious emails to execute commands on systems. Users of Libraesva ESG should update
@bigmacd16684
25 Sept 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-59689
@transilienceai
25 Sept 2025
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
๐จ Patch NOW: Libraesva issues emergency fix for CVE-2025-59689. โ ๏ธ Exploited via malicious compressed email attachments โ ๏ธ RCE vulnerability abused by suspected state actors โ ๏ธ Versions <5.0 unsupported โ manual upgrade needed #CyberSecurity #InfoSec #Librae
@ProgresiveRobot
25 Sept 2025
54 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Libraesva ESGใฎใผใญใใค่ๅผฑๆงใๆปๆ่ ใซๆช็จใใใ๏ผCVE-2025-59689๏ผ Libraesva ESG zero-day vulnerability exploited by attackers (CVE-2025-59689) #HelpNetSecurity (Sep 24) https://t.co/lx4nt8CdSz
@foxbook
24 Sept 2025
14 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Libraesva ESG zero-day vulnerability exploited by attackers (CVE-2025-59689) https://t.co/vuflb7q9Um #HelpNetSecurity #Cybersecurity https://t.co/zM0rZqu8EQ
@PoseidonTPA
24 Sept 2025
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐ข ๐๐ญ๐๐ญ๐-๐๐ฉ๐จ๐ง๐ฌ๐จ๐ซ๐๐ ๐๐๐๐ค๐๐ซ๐ฌ ๐๐ฑ๐ฉ๐ฅ๐จ๐ข๐ญ๐ข๐ง๐ ๐๐ข๐๐ซ๐๐๐ฌ๐ฏ๐ ๐๐ฆ๐๐ข๐ฅ ๐๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐๐ญ๐๐ฐ๐๐ฒ ๐๐ฎ๐ฅ๐ง๐๐ซ
@PurpleOps_io
24 Sept 2025
46 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐จ State-sponsored hackers are exploiting a command injection flaw in Libraesva ESG (CVE-2025-59689). Update your Email Security Gateway ASAP! https://t.co/ZcNaLJyyle #CyberSecurity #Libraesva #CVE202559689 #StateSponsoredHacking #EmailSecurity
@0xT3chn0m4nc3r
24 Sept 2025
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐ ุฃุตุฏุฑุช ุดุฑูุฉ Libraesva ุชุญุฏูุซูุง ุฃู ูููุง ูู ุนุงูุฌุฉ ุซุบุฑุฉ ูู ุญู Gateway ุฃู ุงู ุงูุจุฑูุฏ ุงูุฅููุชุฑููู (ESG) ุงุณุชุบููุง ู ู ุซููู ุชูุฏูุฏ ู ุฏุนูู ูู ู ู ุงูุฏููุฉ. ุงูุซุบุฑุฉุ ุงูู ุนุฑููุฉ ุจุงุณู CVE-2025-596
@Cybercachear
24 Sept 2025
54 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Libraesva has issued a security update for its Email Security Gateway after state-sponsored hackers exploited a medium-severity vulnerability (CVE-2025-59689) linked to command injection via malicious emails. #CyberSecurity #Libraesva https://t.co/BvrdwhO5jm
@Cyber_O51NT
24 Sept 2025
397 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
โ ๏ธ State-backed hackers just broke into Libraesvaโs email security gateway. A flaw (CVE-2025-59689) lets a single malicious email run commands on your serverโand itโs already been exploited. Update now before youโre next โ https://t.co/EplN3HXoE5
@TheHackersNews
24 Sept 2025
11307 Impressions
31 Retweets
70 Likes
8 Bookmarks
1 Reply
0 Quotes
๐จAlert๐จ:CVE-2025-59689: Libraesva ESG Command Injection Flaw ๐9.2K+ Services are found on the https://t.co/ysWb28BTvF yearly. ๐Hunter Link:https://t.co/8jCaWDpDT0 ๐Query HUNTER : https://t.co/q9rtuGfZuz="Libraesva ESG" ๐ฐRefer:https://t.co/xWQNS6ciBn https://t.co
@HunterMapping
23 Sept 2025
1433 Impressions
2 Retweets
18 Likes
7 Bookmarks
0 Replies
0 Quotes
๐จ๐จCVE-2025-59689: Libraesva ESG Command Injection Flaw A malicious email with a crafted compressed attachment can bypass Libraesva ESG's code sanitization, allowing arbitrary command execution as a non-privileged user. Search by vul.cve Filter๐vul.cve="CVE-2025-59689" Z
@zoomeye_team
23 Sept 2025
989 Impressions
2 Retweets
8 Likes
2 Bookmarks
0 Replies
0 Quotes
๐จ Alert: CVE-2025-59689 poses a high risk of exploitation! Libraesva ESG 4.5-5.5.x affected by command injection via email attachments. ๐ง Patch now! ๐ก๏ธ Updates: 5.0.31, 5.1.20, 5.2.31, 5.4.8, and 5.5.7. Stay safe! #cybersecurity #infosec #patchnow ๐
@SecAideInfo
22 Sept 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-59689 Command Injection Vulnerability in Libraesva ESG Email Security Gateway 4.5-5.5.x https://t.co/2iyfSDrOPi
@VulmonFeeds
19 Sept 2025
55 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C7388039-AE70-47F1-A389-EF05FCB34E61",
"versionEndExcluding": "5.0.31",
"versionStartIncluding": "4.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A280A808-E1F6-4B0A-B44F-47E5C9152B36",
"versionEndExcluding": "5.1.20",
"versionStartIncluding": "5.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62A71B25-7262-43CC-94E8-C92CC5932D86",
"versionEndExcluding": "5.2.31",
"versionStartIncluding": "5.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EDC45835-D39B-47A1-BE61-42CD7ACD6988",
"versionEndExcluding": "5.3.16",
"versionStartIncluding": "5.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C2D53E14-0C5F-4DE0-8785-F59A85107D9C",
"versionEndExcluding": "5.4.8",
"versionStartIncluding": "5.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7CF82183-A726-4FEE-95FA-4062C5F7FEEB",
"versionEndExcluding": "5.5.7",
"versionStartIncluding": "5.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]