Libraesva Security Flaw: Patch Now Before Your Emails Take a World Tour!
Libraesva’s Email Security Gateway just got its own extreme makeover: security edition. A recent vulnerability—CVE-2025-59689—has been exploited by state-sponsored actors. Update now or risk hosting a malicious email party where uninvited code crashes your system. Be the hero your inbox deserves.

Hot Take:
Libraesva just gave us a crash course in cyber hygiene—patch early, patch often, and mind those compressed files unless you want a state-sponsored hacker making themselves at home in your inbox. Honestly, you’d think by now we’d know not to trust anything that comes zipped up tighter than a pair of skinny jeans.
Key Points:
- Libraesva released a security update for a vulnerability in its Email Security Gateway (ESG) solution.
- The vulnerability, CVE-2025-59689, has a CVSS score of 6.1, indicating medium severity.
- The flaw allows for command injection via a malicious email with a specially crafted compressed attachment.
- This vulnerability affects ESG versions 4.5 through 5.5.x before 5.5.7; updates are available.
- The attack has been linked to a state-sponsored threat actor, with at least one confirmed incident.
Already a member? Log in here