Libraseva urges users to patch now, since it emits an emergency solution after attacks


  • LIBRAESVA PARCHADO CVE-2025-59689, a vulnerability of execution of remote medium severity commands
  • Attack exploded compressed attachments of email; Threat actor probably a hostile foreign state
  • The versions below 5.0 are not compatible and require manual updates to stay safe

Libraesva Email Security Gateway (ESG) has paired a vulnerability of average severity apparently abused by threat actors sponsored by the State to achieve remote command execution capabilities (RCE) at specific final points.

In a security notice, Libraesva announced to address an command injection failure that can be activated by a malicious email with a compressed attached file specially prepared.

scroll to top