6.1

CVE-2025-59689

Warnung
Libraesva ESG 4.5 through 5.5.x before 5.5.7 allows command injection via a compressed e-mail attachment. For ESG 5.0 a fix has been released in 5.0.31. For ESG 5.1 a fix has been released in 5.1.20. For ESG 5.2 a fix has been released in 5.2.31. For ESG 5.4 a fix has been released in 5.4.8. For ESG 5.5. a fix has been released in 5.5.7.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LibraesvaEmail Security Gateway Version >= 4.5 < 5.0.31
LibraesvaEmail Security Gateway Version >= 5.1.0 < 5.1.20
LibraesvaEmail Security Gateway Version >= 5.2.0 < 5.2.31
LibraesvaEmail Security Gateway Version >= 5.3.0 < 5.3.16
LibraesvaEmail Security Gateway Version >= 5.4.0 < 5.4.8
LibraesvaEmail Security Gateway Version >= 5.5.0 < 5.5.7

29.09.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog

Libraesva Email Security Gateway Command Injection Vulnerability

Schwachstelle

Libraesva Email Security Gateway (ESG) contains a command injection vulnerability which allows command injection via a compressed e-mail attachment.

Beschreibung

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 6.01% 0.906
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
cve@mitre.org 6.1 2.8 2.7
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.