Command Injection via Compressed Email in Libraesva ESG 4.5-5.5.x (fixed 5.5.7)
CVE-2025-59689 Published on September 19, 2025
Libraesva ESG 4.5 through 5.5.x before 5.5.7 allows command injection via a compressed e-mail attachment. For ESG 5.0 a fix has been released in 5.0.31. For ESG 5.1 a fix has been released in 5.1.20. For ESG 5.2 a fix has been released in 5.2.31. For ESG 5.4 a fix has been released in 5.4.8. For ESG 5.5. a fix has been released in 5.5.7.
Known Exploited Vulnerability
This Libraesva Email Security Gateway Command Injection Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Libraesva Email Security Gateway (ESG) contains a command injection vulnerability which allows command injection via a compressed e-mail attachment.
The following remediation steps are recommended / required by October 20, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Weakness Type
What is a Command Injection Vulnerability?
The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
CVE-2025-59689 has been classified to as a Command Injection vulnerability or weakness.
Affected Versions
Libraesva Email Security Gateway:- Version 4.5 and below 5.0.31 is affected.
- Version 5.1 and below 5.1.20 is affected.
- Version 5.2 and below 5.2.31 is affected.
- Version 5.3 and below 5.4.8 is affected.
- Version 5.5 and below 5.5.7 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.