CVE-2025-59689
Published Sep 19, 2025
Last updated a month ago
AI description
CVE-2025-59689 is a command injection vulnerability affecting Libraesva Email Security Gateway (ESG) versions 4.5 through 5.5.x before 5.5.7. It stems from improper sanitization when the software removes active code from files within certain compressed archive formats. Attackers can exploit this vulnerability by sending emails containing specially crafted compressed attachments. The payload files are designed to manipulate the application's sanitization logic, allowing the execution of arbitrary shell commands under a non-privileged user account. Fixes have been released for ESG versions 5.0, 5.1, 5.2, 5.4, and 5.5.
- Description
- Libraesva ESG 4.5 through 5.5.x before 5.5.7 allows command injection via a compressed e-mail attachment. For ESG 5.0 a fix has been released in 5.0.31. For ESG 5.1 a fix has been released in 5.1.20. For ESG 5.2 a fix has been released in 5.2.31. For ESG 5.4 a fix has been released in 5.4.8. For ESG 5.5. a fix has been released in 5.5.7.
- Source
- cve@mitre.org
- NVD status
- Analyzed
- Products
- email_security_gateway
CVSS 3.1
- Type
- Secondary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
Data from CISA
- Vulnerability name
- Libraesva Email Security Gateway Command Injection Vulnerability
- Exploit added on
- Sep 29, 2025
- Exploit action due
- Oct 20, 2025
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- cve@mitre.org
- CWE-77
- Hype score
- Not currently trending
Latest Known Exploited Vulnerabilities (#KEV) : #CVE-2025-59689 #Libraesva Email Security Gateway Command Injection Vulnerability https://t.co/YIFBX5tnPE
@ScyScan
29 Sept 2025
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
NATION-STATE ALERT! Spies are exploiting the Libraesva ESG Zero-Day (CVE-2025-59689) to compromise email systems globally. If you use Libraesva, your sensitive communications are being stolen. Full report on - https://t.co/xJSUhbz5TF https://t.co/rXVhdVRlSy
@Iambivash007
28 Sept 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐ Los piratas informรกticos patrocinados por el Estado explotaron una vulnerabilidad, identificada como CVE-2025-59689, en #Libraesva Email Gateway a travรฉs de archivos adjuntos maliciosos. #QintegraNews #ciberseguridad @securityaffairs https://t.co/IYETGYMZiB
@QintegraC
26 Sept 2025
36 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-59689
@transilienceai
26 Sept 2025
21 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Libraesva has patched a critical command injection vulnerability (CVE-2025-59689) in its Email Security Gateway with a CVSS score of 6.1, used by threat actors. Attackers exploit this flaw via malicious emails to execute commands on systems. Users of Libraesva ESG should update
@bigmacd16684
25 Sept 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-59689
@transilienceai
25 Sept 2025
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
๐จ Patch NOW: Libraesva issues emergency fix for CVE-2025-59689. โ ๏ธ Exploited via malicious compressed email attachments โ ๏ธ RCE vulnerability abused by suspected state actors โ ๏ธ Versions <5.0 unsupported โ manual upgrade needed #CyberSecurity #InfoSec #Librae
@ProgresiveRobot
25 Sept 2025
54 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Libraesva ESGใฎใผใญใใค่ๅผฑๆงใๆปๆ่ ใซๆช็จใใใ๏ผCVE-2025-59689๏ผ Libraesva ESG zero-day vulnerability exploited by attackers (CVE-2025-59689) #HelpNetSecurity (Sep 24) https://t.co/lx4nt8CdSz
@foxbook
24 Sept 2025
14 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Libraesva ESG zero-day vulnerability exploited by attackers (CVE-2025-59689) https://t.co/vuflb7q9Um #HelpNetSecurity #Cybersecurity https://t.co/zM0rZqu8EQ
@PoseidonTPA
24 Sept 2025
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐ข ๐๐ญ๐๐ญ๐-๐๐ฉ๐จ๐ง๐ฌ๐จ๐ซ๐๐ ๐๐๐๐ค๐๐ซ๐ฌ ๐๐ฑ๐ฉ๐ฅ๐จ๐ข๐ญ๐ข๐ง๐ ๐๐ข๐๐ซ๐๐๐ฌ๐ฏ๐ ๐๐ฆ๐๐ข๐ฅ ๐๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐๐ญ๐๐ฐ๐๐ฒ ๐๐ฎ๐ฅ๐ง๐๐ซ
@PurpleOps_io
24 Sept 2025
46 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐จ State-sponsored hackers are exploiting a command injection flaw in Libraesva ESG (CVE-2025-59689). Update your Email Security Gateway ASAP! https://t.co/ZcNaLJyyle #CyberSecurity #Libraesva #CVE202559689 #StateSponsoredHacking #EmailSecurity
@0xT3chn0m4nc3r
24 Sept 2025
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐ ุฃุตุฏุฑุช ุดุฑูุฉ Libraesva ุชุญุฏูุซูุง ุฃู ูููุง ูู ุนุงูุฌุฉ ุซุบุฑุฉ ูู ุญู Gateway ุฃู ุงู ุงูุจุฑูุฏ ุงูุฅููุชุฑููู (ESG) ุงุณุชุบููุง ู ู ุซููู ุชูุฏูุฏ ู ุฏุนูู ูู ู ู ุงูุฏููุฉ. ุงูุซุบุฑุฉุ ุงูู ุนุฑููุฉ ุจุงุณู CVE-2025-596
@Cybercachear
24 Sept 2025
54 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Libraesva has issued a security update for its Email Security Gateway after state-sponsored hackers exploited a medium-severity vulnerability (CVE-2025-59689) linked to command injection via malicious emails. #CyberSecurity #Libraesva https://t.co/BvrdwhO5jm
@Cyber_O51NT
24 Sept 2025
397 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
โ ๏ธ State-backed hackers just broke into Libraesvaโs email security gateway. A flaw (CVE-2025-59689) lets a single malicious email run commands on your serverโand itโs already been exploited. Update now before youโre next โ https://t.co/EplN3HXoE5
@TheHackersNews
24 Sept 2025
11307 Impressions
31 Retweets
70 Likes
8 Bookmarks
1 Reply
0 Quotes
๐จAlert๐จ:CVE-2025-59689: Libraesva ESG Command Injection Flaw ๐9.2K+ Services are found on the https://t.co/ysWb28BTvF yearly. ๐Hunter Link:https://t.co/8jCaWDpDT0 ๐Query HUNTER : https://t.co/q9rtuGfZuz="Libraesva ESG" ๐ฐRefer:https://t.co/xWQNS6ciBn https://t.co
@HunterMapping
23 Sept 2025
1433 Impressions
2 Retweets
18 Likes
7 Bookmarks
0 Replies
0 Quotes
๐จ๐จCVE-2025-59689: Libraesva ESG Command Injection Flaw A malicious email with a crafted compressed attachment can bypass Libraesva ESG's code sanitization, allowing arbitrary command execution as a non-privileged user. Search by vul.cve Filter๐vul.cve="CVE-2025-59689" Z
@zoomeye_team
23 Sept 2025
989 Impressions
2 Retweets
8 Likes
2 Bookmarks
0 Replies
0 Quotes
๐จ Alert: CVE-2025-59689 poses a high risk of exploitation! Libraesva ESG 4.5-5.5.x affected by command injection via email attachments. ๐ง Patch now! ๐ก๏ธ Updates: 5.0.31, 5.1.20, 5.2.31, 5.4.8, and 5.5.7. Stay safe! #cybersecurity #infosec #patchnow ๐
@SecAideInfo
22 Sept 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-59689 Command Injection Vulnerability in Libraesva ESG Email Security Gateway 4.5-5.5.x https://t.co/2iyfSDrOPi
@VulmonFeeds
19 Sept 2025
55 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C7388039-AE70-47F1-A389-EF05FCB34E61",
"versionEndExcluding": "5.0.31",
"versionStartIncluding": "4.5"
},
{
"criteria": "cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A280A808-E1F6-4B0A-B44F-47E5C9152B36",
"versionEndExcluding": "5.1.20",
"versionStartIncluding": "5.1.0"
},
{
"criteria": "cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "62A71B25-7262-43CC-94E8-C92CC5932D86",
"versionEndExcluding": "5.2.31",
"versionStartIncluding": "5.2.0"
},
{
"criteria": "cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "EDC45835-D39B-47A1-BE61-42CD7ACD6988",
"versionEndExcluding": "5.3.16",
"versionStartIncluding": "5.3.0"
},
{
"criteria": "cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C2D53E14-0C5F-4DE0-8785-F59A85107D9C",
"versionEndExcluding": "5.4.8",
"versionStartIncluding": "5.4.0"
},
{
"criteria": "cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7CF82183-A726-4FEE-95FA-4062C5F7FEEB",
"versionEndExcluding": "5.5.7",
"versionStartIncluding": "5.5.0"
}
],
"operator": "OR"
}
]
}
]