cve-2025-59689
Vulnerability from cvelistv5
Published
2025-09-19 00:00
Modified
2025-09-29 22:20
Severity ?
EPSS score ?
Summary
Libraesva ESG 4.5 through 5.5.x before 5.5.7 allows command injection via a compressed e-mail attachment. For ESG 5.0 a fix has been released in 5.0.31. For ESG 5.1 a fix has been released in 5.1.20. For ESG 5.2 a fix has been released in 5.2.31. For ESG 5.4 a fix has been released in 5.4.8. For ESG 5.5. a fix has been released in 5.5.7.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Libraesva | Email Security Gateway |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-59689", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-23T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2025-09-29", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-59689" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-09-29T22:20:24.203Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2025-09-29T00:00:00+00:00", "value": "CVE-2025-59689 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Email Security Gateway", "vendor": "Libraesva", "versions": [ { "lessThan": "5.0.31", "status": "affected", "version": "4.5", "versionType": "custom" }, { "lessThan": "5.1.20", "status": "affected", "version": "5.1", "versionType": "custom" }, { "lessThan": "5.2.31", "status": "affected", "version": "5.2", "versionType": "custom" }, { "lessThan": "5.4.8", "status": "affected", "version": "5.3", "versionType": "custom" }, { "lessThan": "5.5.7", "status": "affected", "version": "5.5", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Libraesva ESG 4.5 through 5.5.x before 5.5.7 allows command injection via a compressed e-mail attachment. For ESG 5.0 a fix has been released in 5.0.31. For ESG 5.1 a fix has been released in 5.1.20. For ESG 5.2 a fix has been released in 5.2.31. For ESG 5.4 a fix has been released in 5.4.8. For ESG 5.5. a fix has been released in 5.5.7." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-19T20:08:41.819Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.libraesva.com/security-blog/" }, { "url": "https://docs.libraesva.com/knowledgebase/security-advisory-command-injection-vulnerability-cve-2025-59689/" } ], "x_generator": { "engine": "enrichogram 0.0.1" } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2025-59689", "datePublished": "2025-09-19T00:00:00.000Z", "dateReserved": "2025-09-18T00:00:00.000Z", "dateUpdated": "2025-09-29T22:20:24.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-59689\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2025-09-19T20:15:40.340\",\"lastModified\":\"2025-09-30T14:31:53.087\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Libraesva ESG 4.5 through 5.5.x before 5.5.7 allows command injection via a compressed e-mail attachment. For ESG 5.0 a fix has been released in 5.0.31. For ESG 5.1 a fix has been released in 5.1.20. For ESG 5.2 a fix has been released in 5.2.31. For ESG 5.4 a fix has been released in 5.4.8. For ESG 5.5. a fix has been released in 5.5.7.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}]},\"cisaExploitAdd\":\"2025-09-29\",\"cisaActionDue\":\"2025-10-20\",\"cisaRequiredAction\":\"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\",\"cisaVulnerabilityName\":\"Libraesva Email Security Gateway Command Injection Vulnerability\",\"weaknesses\":[{\"source\":\"cve@mitre.org\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-77\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5\",\"versionEndExcluding\":\"5.0.31\",\"matchCriteriaId\":\"C7388039-AE70-47F1-A389-EF05FCB34E61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.1.0\",\"versionEndExcluding\":\"5.1.20\",\"matchCriteriaId\":\"A280A808-E1F6-4B0A-B44F-47E5C9152B36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.2.0\",\"versionEndExcluding\":\"5.2.31\",\"matchCriteriaId\":\"62A71B25-7262-43CC-94E8-C92CC5932D86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.3.0\",\"versionEndExcluding\":\"5.3.16\",\"matchCriteriaId\":\"EDC45835-D39B-47A1-BE61-42CD7ACD6988\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.4.0\",\"versionEndExcluding\":\"5.4.8\",\"matchCriteriaId\":\"C2D53E14-0C5F-4DE0-8785-F59A85107D9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libraesva:email_security_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5.0\",\"versionEndExcluding\":\"5.5.7\",\"matchCriteriaId\":\"7CF82183-A726-4FEE-95FA-4062C5F7FEEB\"}]}]}],\"references\":[{\"url\":\"https://docs.libraesva.com/knowledgebase/security-advisory-command-injection-vulnerability-cve-2025-59689/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.libraesva.com/security-blog/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.