CVE-2025-59689
Published Sep 19, 2025
Last updated 3 days ago
AI description
CVE-2025-59689 is a command injection vulnerability affecting Libraesva Email Security Gateway (ESG) versions 4.5 through 5.5.x before 5.5.7. It stems from improper sanitization when the software removes active code from files within certain compressed archive formats. Attackers can exploit this vulnerability by sending emails containing specially crafted compressed attachments. The payload files are designed to manipulate the application's sanitization logic, allowing the execution of arbitrary shell commands under a non-privileged user account. Fixes have been released for ESG versions 5.0, 5.1, 5.2, 5.4, and 5.5.
- Description
- Libraesva ESG 4.5 through 5.5.x before 5.5.7 allows command injection via a compressed e-mail attachment. For ESG 5.0 a fix has been released in 5.0.31. For ESG 5.1 a fix has been released in 5.1.20. For ESG 5.2 a fix has been released in 5.2.31. For ESG 5.4 a fix has been released in 5.4.8. For ESG 5.5. a fix has been released in 5.5.7.
- Source
- cve@mitre.org
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
- cve@mitre.org
- CWE-77
- Hype score
- Not currently trending
Libraesva has patched a critical command injection vulnerability (CVE-2025-59689) in its Email Security Gateway with a CVSS score of 6.1, used by threat actors. Attackers exploit this flaw via malicious emails to execute commands on systems. Users of Libraesva ESG should update
@bigmacd16684
25 Sept 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-59689
@transilienceai
25 Sept 2025
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
๐จ Patch NOW: Libraesva issues emergency fix for CVE-2025-59689. โ ๏ธ Exploited via malicious compressed email attachments โ ๏ธ RCE vulnerability abused by suspected state actors โ ๏ธ Versions <5.0 unsupported โ manual upgrade needed #CyberSecurity #InfoSec #Librae
@ProgresiveRobot
25 Sept 2025
54 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Libraesva ESGใฎใผใญใใค่ๅผฑๆงใๆปๆ่ ใซๆช็จใใใ๏ผCVE-2025-59689๏ผ Libraesva ESG zero-day vulnerability exploited by attackers (CVE-2025-59689) #HelpNetSecurity (Sep 24) https://t.co/lx4nt8CdSz
@foxbook
24 Sept 2025
14 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Libraesva ESG zero-day vulnerability exploited by attackers (CVE-2025-59689) https://t.co/vuflb7q9Um #HelpNetSecurity #Cybersecurity https://t.co/zM0rZqu8EQ
@PoseidonTPA
24 Sept 2025
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐ข ๐๐ญ๐๐ญ๐-๐๐ฉ๐จ๐ง๐ฌ๐จ๐ซ๐๐ ๐๐๐๐ค๐๐ซ๐ฌ ๐๐ฑ๐ฉ๐ฅ๐จ๐ข๐ญ๐ข๐ง๐ ๐๐ข๐๐ซ๐๐๐ฌ๐ฏ๐ ๐๐ฆ๐๐ข๐ฅ ๐๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐๐ญ๐๐ฐ๐๐ฒ ๐๐ฎ๐ฅ๐ง๐๐ซ
@PurpleOps_io
24 Sept 2025
46 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐จ State-sponsored hackers are exploiting a command injection flaw in Libraesva ESG (CVE-2025-59689). Update your Email Security Gateway ASAP! https://t.co/ZcNaLJyyle #CyberSecurity #Libraesva #CVE202559689 #StateSponsoredHacking #EmailSecurity
@0xT3chn0m4nc3r
24 Sept 2025
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐ ุฃุตุฏุฑุช ุดุฑูุฉ Libraesva ุชุญุฏูุซูุง ุฃู ูููุง ูู ุนุงูุฌุฉ ุซุบุฑุฉ ูู ุญู Gateway ุฃู ุงู ุงูุจุฑูุฏ ุงูุฅููุชุฑููู (ESG) ุงุณุชุบููุง ู ู ุซููู ุชูุฏูุฏ ู ุฏุนูู ูู ู ู ุงูุฏููุฉ. ุงูุซุบุฑุฉุ ุงูู ุนุฑููุฉ ุจุงุณู CVE-2025-596
@Cybercachear
24 Sept 2025
54 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Libraesva has issued a security update for its Email Security Gateway after state-sponsored hackers exploited a medium-severity vulnerability (CVE-2025-59689) linked to command injection via malicious emails. #CyberSecurity #Libraesva https://t.co/BvrdwhO5jm
@Cyber_O51NT
24 Sept 2025
397 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
โ ๏ธ State-backed hackers just broke into Libraesvaโs email security gateway. A flaw (CVE-2025-59689) lets a single malicious email run commands on your serverโand itโs already been exploited. Update now before youโre next โ https://t.co/EplN3HXoE5
@TheHackersNews
24 Sept 2025
11307 Impressions
31 Retweets
70 Likes
8 Bookmarks
1 Reply
0 Quotes
๐จAlert๐จ:CVE-2025-59689: Libraesva ESG Command Injection Flaw ๐9.2K+ Services are found on the https://t.co/ysWb28BTvF yearly. ๐Hunter Link:https://t.co/8jCaWDpDT0 ๐Query HUNTER : https://t.co/q9rtuGfZuz="Libraesva ESG" ๐ฐRefer:https://t.co/xWQNS6ciBn https://t.co
@HunterMapping
23 Sept 2025
1433 Impressions
2 Retweets
18 Likes
7 Bookmarks
0 Replies
0 Quotes
๐จ๐จCVE-2025-59689: Libraesva ESG Command Injection Flaw A malicious email with a crafted compressed attachment can bypass Libraesva ESG's code sanitization, allowing arbitrary command execution as a non-privileged user. Search by vul.cve Filter๐vul.cve="CVE-2025-59689" Z
@zoomeye_team
23 Sept 2025
989 Impressions
2 Retweets
8 Likes
2 Bookmarks
0 Replies
0 Quotes
๐จ Alert: CVE-2025-59689 poses a high risk of exploitation! Libraesva ESG 4.5-5.5.x affected by command injection via email attachments. ๐ง Patch now! ๐ก๏ธ Updates: 5.0.31, 5.1.20, 5.2.31, 5.4.8, and 5.5.7. Stay safe! #cybersecurity #infosec #patchnow ๐
@SecAideInfo
22 Sept 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-59689 Command Injection Vulnerability in Libraesva ESG Email Security Gateway 4.5-5.5.x https://t.co/2iyfSDrOPi
@VulmonFeeds
19 Sept 2025
55 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes