CVE Alert: CVE-2025-59689 – Libraesva – Email Security Gateway
CVE-2025-59689
Libraesva ESG 4.5 through 5.5.x before 5.5.7 allows command injection via a compressed e-mail attachment. For ESG 5.0 a fix has been released in 5.0.31. For ESG 5.1 a fix has been released in 5.1.20. For ESG 5.2 a fix has been released in 5.2.31. For ESG 5.4 a fix has been released in 5.4.8. For ESG 5.5. a fix has been released in 5.5.7.
AI Summary Analysis
Risk verdict
High urgency due to active exploitation of a command-injection vulnerability via compressed email attachments; treat as a top concern for organisations using the affected software.
Why this matters
If exploited, attackers can execute arbitrary commands on the appliance, potentially gaining control and impacting data integrity and confidentiality. The requirement for user interaction (phishing-like attachment) means social-engineering success remains a critical factor, but activity is currently observed in the wild, increasing risk of rapid weaponisation.
Most likely attack path
The flaw is exploitable without network access (AV:N) but requires user interaction (UI:R) and no privileges (PR:N), with low attack complexity (AC:L). An attacker can send a malicious compressed attachment; a user opens it, triggering command execution with only basic user rights. The breach can propagate within the compromised host (scope change) and, per independent indicators, may enable broader impact if not contained.
Who is most exposed
organisations relying on on-prem or hosted email security gateways, especially in mid-size to large environments with high volumes of inbound mail and varied attachment types, are most at risk. Environments with delayed patching or customised deployments are particularly vulnerable.
Detection ideas
- Elevated command-line activity or shell processes triggered after opening attachments.
- Logs showing execution attempts tied to compressed attachment handling (attachment decompression steps).
- Unusual or unexpected process spawns around email filtering components only after user interactions.
- Anomalous outbound traffic or data access following the initial access point.
- Repeated attachment-related errors or alerts from mail-scanning subsystems.
Mitigation and prioritisation
- Patch to the latest fixed release for your line (versions with fixes: 5.0.31, 5.1.20, 5.2.31, 5.4.8, 5.5.7 or newer). Apply at the next planned window.
- If patching is delayed, implement compensating controls: restrict or sandbox compressed attachments, strengthen attachment scanning, enable strict email content sanitisation, and enforce least privilege and application whitelisting on the appliance.
- Enable enhanced logging and immediate alerting for attachment-handling components; ensure EDR/EDR-like monitoring covers the gateway host.
- Change-management note: coordinate with IT/SOC to test fix in a staging environment; communicate expected disruption and rollback plan.
- If KEV or EPSS values become available and indicate higher probability or impact, adjust to Priority 1. Currently, exploitation is active per third-party advisories, but quantitative KEV/EPSS data is missing.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.