CVE-2025-59689
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-19

Last updated on: 2025-11-05

Assigner: MITRE

Description
Libraesva ESG 4.5 through 5.5.x before 5.5.7 allows command injection via a compressed e-mail attachment. For ESG 5.0 a fix has been released in 5.0.31. For ESG 5.1 a fix has been released in 5.1.20. For ESG 5.2 a fix has been released in 5.2.31. For ESG 5.4 a fix has been released in 5.4.8. For ESG 5.5. a fix has been released in 5.5.7.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-19
Last Modified
2025-11-05
Generated
2026-05-07
AI Q&A
2025-09-19
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 6 associated CPEs
Vendor Product Version / Range
libraesva email_security_gateway From 4.5 (inc) to 5.0.31 (exc)
libraesva email_security_gateway From 5.1.0 (inc) to 5.1.20 (exc)
libraesva email_security_gateway From 5.2.0 (inc) to 5.2.31 (exc)
libraesva email_security_gateway From 5.3.0 (inc) to 5.3.16 (exc)
libraesva email_security_gateway From 5.4.0 (inc) to 5.4.8 (exc)
libraesva email_security_gateway From 5.5.0 (inc) to 5.5.7 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-59689 is a command injection vulnerability in Libraesva ESG (Email Security Gateway) versions 4.5 through 5.5.x before 5.5.7. It occurs when a malicious email contains a specially crafted compressed archive attachment. Due to improper sanitization during the removal of active code from files inside certain compressed archive formats, an attacker can bypass this sanitization and execute arbitrary shell commands as a non-privileged user. [1]


How can this vulnerability impact me? :

This vulnerability can allow an attacker to execute arbitrary commands on the affected system with non-privileged user rights by sending a malicious email with a crafted compressed attachment. This could lead to unauthorized actions on the system, potential compromise of the email gateway, and further exploitation within the network. There has been at least one confirmed exploitation incident linked to a foreign hostile state actor. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of CVE-2025-59689 involves scanning for indicators of compromise related to malicious compressed email attachments exploiting the command injection flaw. Libraesva released an automated scan tool and a self-assessment module as part of the emergency patch to detect exploitation attempts and verify patch integrity. Specific commands are not detailed in the provided resources, but using the official automated scan and self-assessment tools from Libraesva is recommended to identify exploitation. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading Libraesva ESG to the fixed versions: 5.0.31 for ESG 5.0, 5.1.20 for ESG 5.1, 5.2.31 for ESG 5.2, 5.4.8 for ESG 5.4, and 5.5.7 for ESG 5.5. On-premise customers on 4.x versions must manually upgrade to 5.x. Cloud customers and on-premise customers on 5.x versions have been automatically upgraded. Additionally, applying the emergency patch that includes the sanitization fix, automated scan for IoCs, and self-assessment module is critical to mitigate the vulnerability. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart