PT-2025-38625 · Unknown · Libraesva Esg
Published
2025-09-19
·
Updated
2025-10-29
·
CVE-2025-59689
CVSS v3.1
6.1
6.1
Medium
| Base vector | Vector | AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
Name of the Vulnerable Software and Affected Versions
Libraesva Email Security Gateway versions 4.5 through 5.5.x before 5.5.7
Libraesva Email Security Gateway version 5.0 through 5.0.31
Libraesva Email Security Gateway version 5.1 through 5.1.20
Libraesva Email Security Gateway version 5.2 through 5.2.31
Libraesva Email Security Gateway version 5.4 through 5.4.8
Libraesva Email Security Gateway version 5.5 through 5.5.7
Description
Libraesva Email Security Gateway (ESG) is affected by a command injection flaw. This issue allows attackers to execute arbitrary commands on a system by sending a specially crafted compressed email attachment. The vulnerability has been actively exploited by a foreign hostile state entity. Over 200,000 users depend on ESG, with strong adoption in education, finance, and government sectors. The exploitation involves sending emails with malicious compressed attachments that bypass code sanitization, enabling arbitrary command execution as a non-privileged user. The affected API endpoints and vulnerable parameters were not specified.
Recommendations
For Libraesva ESG version 4.5 through 5.5.x before 5.5.7, update to version 5.5.7 or later.
For Libraesva ESG version 5.0, update to version 5.0.31.
For Libraesva ESG version 5.1, update to version 5.1.20.
For Libraesva ESG version 5.2, update to version 5.2.31.
For Libraesva ESG version 5.4, update to version 5.4.8.
For Libraesva ESG versions prior to 5.0, upgrade to a supported version.
Tighten compressed-file handling policies.
Monitor ESG logs for unusual command-execution activity.
Fix
RCE
Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
CVE-2025-59689
Affected Products
Libraesva Esg
References · 48
- https://libraesva.com/security-blog · Vendor Advisory
- https://docs.libraesva.com/knowledgebase/security-advisory-command-injection-vulnerability-cve-2025-59689 · Security Note, Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-59689 · Security Note
- https://t.me/CVEtracker/32982 · Telegram Post
- https://twitter.com/TheCyberSecHub/status/1970842055338610720 · Twitter Post
- https://twitter.com/autumn_good_35/status/1970749434721116422 · Twitter Post
- https://twitter.com/transilienceai/status/1971084663172235286 · Twitter Post
- https://twitter.com/zoomeye_team/status/1970328192310485340 · Twitter Post
- https://t.me/true_secator/7474 · Telegram Post
- https://twitter.com/CVEnew/status/1969291955591856439 · Twitter Post
- https://twitter.com/shah_sheikh/status/1970866367675924760 · Twitter Post
- https://twitter.com/godeepweb/status/1970879660067029272 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1nq2t24/top_10_trending_cves_25092025 · Reddit Post
- https://twitter.com/DarkWebInformer/status/1975230846484484564 · Twitter Post
- https://twitter.com/ProgresiveRobot/status/1971032477365043412 · Twitter Post