Libraesva ESG 4.5 < 5.0.31 / 5.1.20 / 5.2.31 / 5.3.16 / 5.4.8 / 5.5.7 Command Injection (CVE-2025-59689)

medium Nessus Plugin ID 282475

Synopsis

The remote Libraesva ESG host is affected by a command injection vulnerability.

Description

The version of Libraesva ESG installed on the remote host is affected by a command injection flaw as referenced in the CVE-2025-59689 advisory. The vulnerability is triggered by an improper sanitization mechanism when removing active code from specific compressed archive formats.

An attacker can exploit this by sending a malicious email containing a specially crafted compressed attachment. Successful exploitation allows the potential execution of arbitrary shell commands under a non-privileged user account. This vulnerability has been identified as being used in at least one confirmed incident by a foreign hostile state entity.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update Libraesva ESG to version 5.0.31, 5.1.20, 5.2.31, 5.3.16, 5.4.8, 5.5.7 or later.

See Also

http://www.nessus.org/u?6e6329f7

Plugin Details

Severity: Medium

ID: 282475

File Name: libraesva_email_security_gateway_CVE-2025-59689.nasl

Version: 1.1

Type: remote

Family: CGI abuses

Published: 1/8/2026

Updated: 1/8/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.6

CVSS v3

Risk Factor: Medium

Base Score: 6.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Vulnerability Information

CPE: cpe:/a:libraesva:email_security_gateway

Patch Publication Date: 9/19/2025

Vulnerability Publication Date: 9/19/2025

CISA Known Exploited Vulnerability Due Dates: 10/20/2025

Reference Information

CVE: CVE-2025-59689