Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Libraesva ESG Vulnerability Let Attackers Inject Malicious Commands

Libraesva ESG Vulnerability Let Attackers Inject Malicious Commands

Posted on September 23, 2025September 23, 2025 By CWS

A crucial safety flaw in Libraesva ESG e-mail safety gateways has been recognized and patched, permitting risk actors to execute arbitrary instructions by specifically crafted e-mail attachments. 

The vulnerability, tracked as CVE-2025-59689, impacts a number of variations of the favored e-mail safety platform and has already been exploited by what safety researchers imagine to be a overseas state-sponsored risk actor.

The vulnerability stems from improper enter sanitization throughout the elimination of lively code from information contained inside compressed archive codecs. 

When Libraesva ESG processes emails containing specifically crafted compressed attachments, the safety gateway fails to correctly sanitize enter parameters, creating a chance for command injection assaults. 

Libraesva ESG Command Injection Vulnerability

This flaw impacts all Libraesva ESG variations ranging from model 4.5, making it a widespread safety concern for organizations counting on the platform for e-mail safety.

The assault vector requires minimal person interplay, because the malicious payload is delivered by normal e-mail channels. 

Attackers can craft compressed archives containing payload information designed to control the applying’s sanitization logic. 

As soon as the sanitization bypass is achieved, risk actors acquire the flexibility to execute arbitrary shell instructions below a non-privileged person account, doubtlessly compromising your entire e-mail safety infrastructure.

Threat FactorsDetailsAffected ProductsLibraesva ESG 4.5 by 5.5ImpactExecution of arbitrary shell instructions as a non-privileged userExploit PrerequisitesReceipt and processing of a specifically crafted compressed e-mail attachment utilizing particular archive formatsCVSS 3.1 Score6.1 (Medium)

Mitigations

Libraesva demonstrated distinctive incident response capabilities, deploying fixes throughout all affected programs inside 17 hours of discovery. 

The corporate launched emergency patches for a number of variations: ESG 5.0.31, 5.1.20, 5.2.31, 5.3.16, 5.4.8, and 5.5.7. 

These patches have been robotically deployed to all ESG 5.x installations by the platform’s automated replace channel, making certain complete protection for each cloud and on-premise deployments.

The remediation package deal included not solely the core repair addressing the sanitization flaw but additionally automated indicators of compromise (IoCs) scanning capabilities and a self-assessment module. 

This complete method ensures that affected home equipment can confirm patch integrity and detect any residual threats from potential exploitation makes an attempt. 

Cloud clients obtained computerized updates with out requiring guide intervention, whereas on-premise clients with model 5.x home equipment have been robotically upgraded by telemetry-confirmed deployments.

Organizations nonetheless operating model 4.x installations, which have reached end-of-support standing, should manually improve to model 5.x to obtain safety towards this vulnerability. 

The one confirmed exploitation incident, attributed to a overseas hostile state entity, underscores the crucial nature of this safety flaw and the significance of sustaining present software program variations in e-mail safety infrastructure deployments.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Commands, ESG, Inject, Libraesva, Malicious, Vulnerability

Post navigation

Previous Post: European Airport Disruptions Caused by Sophisticated Ransomware Attack
Next Post: BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells

Related Posts

Weaponized Putty and Teams Ads Deliver Malware Allowing Hackers to Access Network Weaponized Putty and Teams Ads Deliver Malware Allowing Hackers to Access Network Cyber Security News
New Vulnerabilities in React Server Components Allow DoS Attacks and Source Code Leaks New Vulnerabilities in React Server Components Allow DoS Attacks and Source Code Leaks Cyber Security News
Chinese State-Sponsored Hackers Attacking Telecommunications Infrastructure to Harvest Sensitive Data Chinese State-Sponsored Hackers Attacking Telecommunications Infrastructure to Harvest Sensitive Data Cyber Security News
MongoDB Server Pre-Authentication Vulnerability Let Attackers Trigger DoS Condition MongoDB Server Pre-Authentication Vulnerability Let Attackers Trigger DoS Condition Cyber Security News
Hackers Launch Widespread Attacks on Palo Alto GlobalProtect Portals from 7,000+ IPs Hackers Launch Widespread Attacks on Palo Alto GlobalProtect Portals from 7,000+ IPs Cyber Security News
Mozilla High Severity Vulnerabilities Enables Remote Code Execution Mozilla High Severity Vulnerabilities Enables Remote Code Execution Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in BeyondTrust Allows Remote Code Execution
  • Ransomware Disrupts BridgePay’s Nationwide Payment Processing
  • German Agencies Issue Alert on Signal Phishing Threat
  • State-Backed Hackers Exploit Signal to Target Officials
  • Urgent Replacement of Discontinued Edge Devices Advised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in BeyondTrust Allows Remote Code Execution
  • Ransomware Disrupts BridgePay’s Nationwide Payment Processing
  • German Agencies Issue Alert on Signal Phishing Threat
  • State-Backed Hackers Exploit Signal to Target Officials
  • Urgent Replacement of Discontinued Edge Devices Advised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark