Libraesva has addressed a vulnerability in its built-in e mail safety platform that has been exploited within the wild.
Tracked as CVE-2025-59689 (CVSS rating of 6.1), the flaw is described as a command injection difficulty that might result in the execution of arbitrary instructions as a non-privileged consumer.
In keeping with Libraesva’s advisory, the bug may very well be exploited through malicious emails containing crafted compressed attachments.
“This happens as a result of an improper sanitization in the course of the removing of lively code from recordsdata contained in some compressed archive codecs,” the corporate explains.
The CVE is triggered with particular archive codecs containing payloads that exploit an improper enter sanitization bug to execute arbitrary shell instructions.
The safety defect impacts Libraesva ESG variations 4.5 by 5.5, however fixes have been launched just for ESG 5.x variations, because the 4.x variations have been discontinued.
Libraesva pushed the patches to each cloud and on-premise ESG deployments and says all home equipment are actually operating a hard and fast software program iteration.
Clients operating on-premise ESG 4.x variations are suggested to manually replace to a patched 5.x model as quickly as doable, provided that the vulnerability has been exploited.Commercial. Scroll to proceed studying.
“One confirmed incident of abuse has been recognized. The risk actor is believed to be a overseas hostile state entity,” Libraesva says.
“The only‑equipment focus underscores the precision of the risk actor (believed to be a overseas hostile state) and highlights the significance of speedy, complete patch deployment,” the corporate notes.
Along with resolving the flaw, Libraesva’s patches scan for indicators-of-compromise (IoCs) and comprise a self-assessment module that checks the patch integrity and hunts for residual threats.
An built-in resolution, Libraesva ESG protects e mail companies from phishing, BEC, and superior threats, and is suited for every type of organizations, together with small and medium-sized companies and huge enterprises.
Associated: SolarWinds Makes Third Try at Patching Exploited Vulnerability
Associated: Patch Bypassed for Supermicro Vulnerability Permitting BMC Hack
Associated: Prime 25 MCP Vulnerabilities Reveal How AI Brokers Can Be Exploited
Associated: Researchers Earn $150,000 for L1TF Exploit Leaking Knowledge From Public Cloud