PT-2025-38625 · Unknown · Libraesva Esg
Published
2025-09-19
·
Updated
2025-09-29
·
CVE-2025-59689
CVSS v3.1
6.1
6.1
Medium
Base vector | Vector | AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
Name of the Vulnerable Software and Affected Versions
Libraesva ESG versions 4.5 through 5.5.x before 5.5.7
Libraesva ESG version 5.0 through 5.0.31
Libraesva ESG version 5.1 through 5.1.20
Libraesva ESG version 5.2 through 5.2.31
Libraesva ESG version 5.4 through 5.4.8
Libraesva ESG version 5.5 through 5.5.7
Versions prior to 5.0
Description
Libraesva ESG is affected by a command injection flaw that can be triggered by processing a specially crafted compressed email attachment. This allows attackers to execute arbitrary commands as a non-privileged user. The issue is due to improper sanitization of code when handling compressed archive files. At least one instance of exploitation by a foreign hostile state entity has been confirmed. It is believed that the attackers were focused on specific ESG appliances, indicating a targeted campaign. Approximately 200,000 users are estimated to be affected, with significant adoption in sectors like education, finance, and government. The API endpoints and vulnerable parameters were not specified.
Recommendations
For Libraesva ESG versions 4.5 through 5.5.x before 5.5.7, update to version 5.5.7 or later.
For Libraesva ESG version 5.0 through 5.0.31, update to version 5.0.31.
For Libraesva ESG version 5.1 through 5.1.20, update to version 5.1.20.
For Libraesva ESG version 5.2 through 5.2.31, update to version 5.2.31.
For Libraesva ESG version 5.4 through 5.4.8, update to version 5.4.8.
For versions prior to 5.0, upgrade to a supported version.
Fix
RCE
Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
CVE-2025-59689
Affected Products
Libraesva Esg
References · 40
- https://docs.libraesva.com/knowledgebase/security-advisory-command-injection-vulnerability-cve-2025-59689 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-59689 · Security Note
- https://reddit.com/r/GetNewsme/comments/1npzbgo/libraesva_releases_emergency_patch_for · Reddit Post
- https://twitter.com/PoseidonTPA/status/1970842058010333316 · Twitter Post
- https://twitter.com/shah_sheikh/status/1970824116392296453 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1970573886031835629 · Twitter Post
- https://twitter.com/CVEnew/status/1969291955591856439 · Twitter Post
- https://twitter.com/securityRSS/status/1970869219316126157 · Twitter Post
- https://twitter.com/Newtalics/status/1970567319828021662 · Twitter Post
- https://t.me/pentestingnews/68529 · Telegram Post
- https://twitter.com/SecAideInfo/status/1970069560289272315 · Twitter Post
- https://twitter.com/helpnetsecurity/status/1970824267349823945 · Twitter Post
- https://libraesva.com/security-blog · Note
- https://reddit.com/r/SecOpsDaily/comments/1np5h2o/statesponsored_hackers_exploiting_libraesva_email · Reddit Post
- https://twitter.com/moton/status/1970981292176179384 · Twitter Post