CVE-2025-59689
Libraesva Email Security Gateway Command Injection Vulnerability - [Actively Exploited]
Description
Libraesva ESG 4.5 through 5.5.x before 5.5.7 allows command injection via a compressed e-mail attachment. For ESG 5.0 a fix has been released in 5.0.31. For ESG 5.1 a fix has been released in 5.1.20. For ESG 5.2 a fix has been released in 5.2.31. For ESG 5.4 a fix has been released in 5.4.8. For ESG 5.5. a fix has been released in 5.5.7.
INFO
Published Date :
Sept. 19, 2025, 8:15 p.m.
Last Modified :
Sept. 30, 2025, 2:31 p.m.
Remotely Exploit :
Yes !
Source :
[email protected]
CISA KEV (Known Exploited Vulnerabilities)
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.
Libraesva Email Security Gateway (ESG) contains a command injection vulnerability which allows command injection via a compressed e-mail attachment.
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
https://docs.libraesva.com/knowledgebase/security-advisory-command-injection-vulnerability-cve-2025-59689/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-59689
CVSS Scores
Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|---|
CVSS 3.1 | MEDIUM | [email protected] |
Solution
- Update ESG to version 5.0.31 if using 5.0.
- Update ESG to version 5.1.20 if using 5.1.
- Update ESG to version 5.2.31 if using 5.2.
- Update ESG to version 5.4.8 if using 5.4.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2025-59689
.
URL | Resource |
---|---|
https://docs.libraesva.com/knowledgebase/security-advisory-command-injection-vulnerability-cve-2025-59689/ | Vendor Advisory |
https://www.libraesva.com/security-blog/ | Vendor Advisory |
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2025-59689
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2025-59689
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2025-59689
vulnerability anywhere in the article.

-
Daily CyberSecurity
CL0P Extortion: Google/Mandiant Expose Zero-Day RCE in Oracle E-Business Suite (CVE-2025-61882)
Google Threat Intelligence Group (GTIG) and Mandiant have jointly disclosed an extensive data theft and extortion campaign targeting Oracle E-Business Suite (EBS) environments, linked to threat actors ... Read more

-
Daily CyberSecurity
Rapid7 Details Cisco ASA Zero-Day Exploit Chain (CVE-2025-20362 & CVE-2025-20333)
Security researchers at Rapid7 have published a detailed technical analysis uncovering how a pair of zero-day vulnerabilities in Cisco Secure Firewall ASA and FTD software were exploited in-the-wild t ... Read more

-
CybersecurityNews
CISA Warns of Libraesva ESG Command Injection Vulnerability Actively Exploited in Attacks
In late September 2025, the Cybersecurity and Infrastructure Security Agency (CISA) issued a public alert regarding the active exploitation of a critical command injection vulnerability tracked as CVE ... Read more

-
TheCyberThrone
CISA Adds Five Actively Exploited Vulnerabilities to KEV Catalog
September 30, 2025The threat landscape continues to evolve rapidly and staying ahead of actively exploited vulnerabilities is key to effective cybersecurity defense. On September 28, 2025, the Cyberse ... Read more

-
The Cyber Express
CISA Adds Five Actively Exploited Vulnerabilities to KEV Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) Catalog by adding five new security flaws that are confirmed to be under active ... Read more

-
The Hacker News
CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems
Sep 30, 2025Ravie LakshmananVulnerability / Linux The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting the Sudo command-line utility fo ... Read more

-
Daily CyberSecurity
NCSC Exposes Advanced Bootkit: RayInitiator and LINE VIPER Malware Found on Cisco ASA Devices
The UK’s National Cyber Security Centre (NCSC) has released a detailed malware analysis report exposing RayInitiator and LINE VIPER, two highly sophisticated tools targeting Cisco ASA devices. These r ... Read more

-
Daily CyberSecurity
TamperedChef Malware Rises: Deceptive Apps Use Signed Binaries and SEO Poisoning to Hijack Browsers
Field Effect’s Threat Intelligence team has uncovered a new wave of the TamperedChef malware campaign, leveraging digitally signed binaries, deceptive packaging, and browser hijackers to deliver malwa ... Read more

-
Daily CyberSecurity
Akira Ransomware Exploits SonicWall VPN Accounts With Lightning-Fast Intrusions
Akira ransomware Leaksite Arctic Wolf has observed a major uptick in Akira ransomware activity since late July 2025, with attackers aggressively targeting SonicWall SSL VPN accounts. The campaign rema ... Read more

-
Daily CyberSecurity
RedNovember: Chinese APT Expands Global Espionage to U.S. Defense, Aerospace, and Tech Firms
A new report from Recorded Future’s Insikt Group reveals that the Chinese state-sponsored threat group RedNovember has significantly broadened its operations, striking across government, defense, aero ... Read more

-
Daily CyberSecurity
Morte Botnet Unveiled: A Rapidly Growing Loader-as-a-Service Campaign Exploiting Routers and Enterprise Apps
Researchers at CloudSEK Threat Intelligence (TRIAD) have exposed a sophisticated botnet operation that systematically compromises SOHO routers, IoT devices, and enterprise applications through web-bas ... Read more

-
Daily CyberSecurity
DLL Hijacking Flaw (CVE-2025-56383) Found in Notepad++, Allowing Arbitrary Code Execution, PoC Available
A newly disclosed vulnerability in Notepad++ v8.8.3 has been assigned CVE-2025-56383. The flaw, rated CVSS 6.5, allows attackers to hijack Notepad++’s DLL loading process, potentially enabling the exe ... Read more

-
CybersecurityNews
Cybersecurity Newsletter Weekly – Chrome 0-Day, 22.2 Tbps DDOS Attack, Kali Linux Release, Cisco IOS 0-Day and More
This week in cybersecurity was marked by a relentless pace of critical disclosures and unprecedented attack volumes, underscoring the escalating challenges facing defenders. At the forefront was Googl ... Read more

-
Help Net Security
Week in review: Cisco ASA zero-day vulnerabilities exploited, Fortra GoAnywhere instances at risk
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How Juventus protects fans, revenue, and reputation during matchdays In this Help Net Security intervi ... Read more

-
Daily CyberSecurity
CVE-2025-59934: Critical Flaw in Formbricks Allows Unauthorized Password Resets via Forged JWT Tokens
The Formbricks project, an open-source platform for building in-app and website surveys, has released an urgent patch addressing a critical authentication vulnerability. Tracked as CVE-2025-59934 with ... Read more

-
Daily CyberSecurity
ChatGPT Pulse Arrives: The Proactive AI Assistant That Reshapes Your Morning Routine
OpenAI has introduced a new feature within ChatGPT called “ChatGPT Pulse”, a service designed to deliver personalized daily summaries, allowing users to quickly grasp essential information at the very ... Read more

-
Daily CyberSecurity
Rack Security Update: High-Severity Flaw Bypasses Parameter Limit, Exposing Apps to DoS Attacks
The Rack project, a key Ruby library providing a minimal and modular interface for web application development, has released a security update addressing a flaw in its query parameter parsing logic. T ... Read more

-
Daily CyberSecurity
CRITICAL Cisco Zero-Day (CVE-2025-20333, CVSS 9.9) Under Active Attack: VPN Flaw Allows Root RCE
Cisco has disclosed a zero-day vulnerability affecting its Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software. Tracked as CVE-2025-20333 with ... Read more

-
Daily CyberSecurity
Cisco Warns of Critical RCE Flaw (CVE-2025-20363) Affecting Firewall and Router Software
Cisco has disclosed a critical vulnerability affecting multiple product lines, including Secure Firewall ASA, Secure Firewall Threat Defense (FTD), IOS, IOS XE, and IOS XR Software. Tracked as CVE-202 ... Read more

-
Daily CyberSecurity
Supply Chain Attack: Malicious Rust Crates Steal Solana and Ethereum Private Keys
Image: Socket’s Threat Research Team Socket’s Threat Research Team has uncovered a supply chain attack involving two malicious Rust crates—faster_log and async_println—that impersonated the legitimate ... Read more
The following table lists the changes that have been made to the
CVE-2025-59689
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Sep. 30, 2025
Action Type Old Value New Value Added CPE Configuration OR *cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:* versions from (including) 4.5 up to (excluding) 5.0.31 *cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:* versions from (including) 5.1.0 up to (excluding) 5.1.20 *cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:* versions from (including) 5.2.0 up to (excluding) 5.2.31 *cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:* versions from (including) 5.3.0 up to (excluding) 5.3.16 *cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:* versions from (including) 5.4.0 up to (excluding) 5.4.8 *cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:* versions from (including) 5.5.0 up to (excluding) 5.5.7 Added Reference Type MITRE: https://docs.libraesva.com/knowledgebase/security-advisory-command-injection-vulnerability-cve-2025-59689/ Types: Vendor Advisory Added Reference Type MITRE: https://www.libraesva.com/security-blog/ Types: Vendor Advisory -
CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725
Sep. 30, 2025
Action Type Old Value New Value Added Date Added 2025-09-29 Added Due Date 2025-10-20 Added Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Added Vulnerability Name Libraesva Email Security Gateway Command Injection Vulnerability -
New CVE Received by [email protected]
Sep. 19, 2025
Action Type Old Value New Value Added Description Libraesva ESG 4.5 through 5.5.x before 5.5.7 allows command injection via a compressed e-mail attachment. For ESG 5.0 a fix has been released in 5.0.31. For ESG 5.1 a fix has been released in 5.1.20. For ESG 5.2 a fix has been released in 5.2.31. For ESG 5.4 a fix has been released in 5.4.8. For ESG 5.5. a fix has been released in 5.5.7. Added CVSS V3.1 AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Added CWE CWE-77 Added Reference https://docs.libraesva.com/knowledgebase/security-advisory-command-injection-vulnerability-cve-2025-59689/ Added Reference https://www.libraesva.com/security-blog/