Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61949: Cross-site scripting (XSS) in LogStare Inc. LogStare Collector (for Windows)

0
Medium
VulnerabilityCVE-2025-61949cvecve-2025-61949
Published: Fri Nov 21 2025 (11/21/2025, 06:17:53 UTC)
Source: CVE Database V5
Vendor/Project: LogStare Inc.
Product: LogStare Collector (for Windows)

Description

LogStare Collector contains a stored cross-site scripting vulnerability in UserManagement. If crafted user information is stored, an arbitrary script may be executed on the web browser of the user who logs in to the product's management page.

AI-Powered Analysis

AILast updated: 11/28/2025, 07:49:41 UTC

Technical Analysis

CVE-2025-61949 is a stored cross-site scripting (XSS) vulnerability identified in LogStare Collector (for Windows), specifically affecting versions 2.4.1 and earlier. The vulnerability resides in the UserManagement functionality, where user-supplied information is insufficiently sanitized before being stored and later rendered in the web-based management interface. When an attacker crafts malicious input and stores it as user information, this payload executes as arbitrary JavaScript in the browser of any user who logs into the management page and views the affected content. This type of stored XSS can lead to session hijacking, credential theft, or unauthorized actions performed with the victim’s privileges within the management console. The attack vector is network-based, but exploitation requires the attacker to have at least low privileges (authenticated user) and the victim to interact by logging into the interface. The vulnerability affects confidentiality and integrity but does not directly impact availability. The CVSS 3.0 score of 5.4 reflects these factors, indicating medium severity. No public exploits or active exploitation have been reported to date. The vulnerability highlights the importance of input validation and output encoding in web applications, especially those managing critical logging infrastructure. LogStare Collector is used in environments requiring centralized log collection and analysis, making the management interface a sensitive target. The vulnerability’s scope is limited to users with access to the management interface, but the potential impact on security posture is significant if exploited.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality and integrity of log management systems. Successful exploitation could allow attackers to hijack sessions of administrators or users with management access, potentially leading to unauthorized changes in log configurations, deletion or tampering of logs, or exposure of sensitive operational data. This could undermine incident response capabilities and compliance with data protection regulations such as GDPR. Since LogStare Collector is used in sectors like critical infrastructure, finance, and government, exploitation could have downstream effects on operational security and regulatory compliance. The requirement for authentication and user interaction limits the attack surface but does not eliminate risk, especially in environments with multiple administrators or where phishing/social engineering could be used to lure victims. The absence of known exploits reduces immediate risk but should not lead to complacency. European organizations relying on LogStare Collector should consider this vulnerability a moderate threat that warrants timely remediation to maintain security and compliance.

Mitigation Recommendations

1. Apply official patches or updates from LogStare Inc. as soon as they are released to address this vulnerability. 2. In the absence of patches, implement strict input validation and output encoding on all user-supplied data within the UserManagement interface to prevent script injection. 3. Restrict access to the LogStare Collector management interface using network segmentation, VPNs, or IP whitelisting to limit exposure to trusted administrators only. 4. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of unauthorized access. 5. Educate administrators about phishing and social engineering risks that could lead to exploitation of this vulnerability. 6. Monitor logs and management interface access for unusual activity or signs of attempted exploitation. 7. Consider deploying web application firewalls (WAF) with rules to detect and block XSS payloads targeting the management interface. 8. Regularly review and audit user accounts and permissions to minimize the number of users with management access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2025-11-10T08:14:04.879Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6920092a04dd2c5f9994c008

Added to database: 11/21/2025, 6:39:38 AM

Last enriched: 11/28/2025, 7:49:41 AM

Last updated: 1/7/2026, 8:50:28 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats