CVE-2025-62189: Incorrect authorization in LogStare Inc. LogStare Collector (for Windows)
LogStare Collector contains an incorrect authorization vulnerability in UserRegistration. If exploited, a non-administrative user may create a new user account by sending a crafted HTTP request.
AI Analysis
Technical Summary
CVE-2025-62189 identifies a security vulnerability in LogStare Collector (Windows) versions 2.4.1 and earlier, specifically an incorrect authorization flaw in the UserRegistration functionality. This vulnerability allows an attacker with non-administrative privileges to bypass authorization controls and create new user accounts by sending specially crafted HTTP requests. The flaw arises because the application fails to properly verify the privileges of the requester before processing user registration requests. Exploitation does not require user interaction and can be performed remotely over the network, making it accessible to internal threat actors or potentially external attackers if the service is exposed. The vulnerability impacts the integrity of the system by enabling unauthorized account creation, which could be leveraged for privilege escalation or lateral movement within the affected environment. The CVSS 3.0 base score is 4.3, reflecting a medium severity due to the requirement of some privileges (PR:L) and no direct impact on confidentiality or availability. No public exploits or active exploitation have been reported to date. The vulnerability is particularly relevant for environments where LogStare Collector is used for log aggregation and monitoring, as unauthorized accounts could undermine the security monitoring process or provide attackers with persistent access.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized user account creation within LogStare Collector deployments, potentially leading to privilege escalation and unauthorized access to log data or system controls. This could compromise the integrity of security monitoring and incident detection, undermining trust in log data and enabling attackers to hide their activities. Organizations in sectors relying heavily on log management for compliance and security, such as finance, energy, and critical infrastructure, may face increased risk. The medium severity score indicates moderate risk, but the potential for internal misuse or lateral movement elevates concern. If exploited, attackers could gain footholds within monitoring infrastructure, complicating incident response and increasing the likelihood of broader compromise. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially in environments with weak internal access controls or exposed management interfaces.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Restrict network access to the LogStare Collector UserRegistration endpoint by applying firewall rules or network segmentation to limit exposure to trusted administrative hosts only. 2) Monitor logs and audit trails for unusual user account creation activities or unexpected HTTP requests targeting the UserRegistration functionality. 3) Enforce strict internal access controls and least privilege principles to minimize the number of users with access to LogStare Collector interfaces. 4) Engage with LogStare Inc. to obtain patches or updates addressing this vulnerability as soon as they become available and prioritize timely deployment. 5) Consider deploying Web Application Firewalls (WAFs) or intrusion detection systems (IDS) with custom rules to detect and block crafted HTTP requests attempting unauthorized user creation. 6) Conduct internal security awareness and training to ensure administrators recognize signs of exploitation attempts. 7) Regularly review and harden configuration settings of LogStare Collector to disable or restrict unnecessary registration or user management features if possible.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-62189: Incorrect authorization in LogStare Inc. LogStare Collector (for Windows)
Description
LogStare Collector contains an incorrect authorization vulnerability in UserRegistration. If exploited, a non-administrative user may create a new user account by sending a crafted HTTP request.
AI-Powered Analysis
Technical Analysis
CVE-2025-62189 identifies a security vulnerability in LogStare Collector (Windows) versions 2.4.1 and earlier, specifically an incorrect authorization flaw in the UserRegistration functionality. This vulnerability allows an attacker with non-administrative privileges to bypass authorization controls and create new user accounts by sending specially crafted HTTP requests. The flaw arises because the application fails to properly verify the privileges of the requester before processing user registration requests. Exploitation does not require user interaction and can be performed remotely over the network, making it accessible to internal threat actors or potentially external attackers if the service is exposed. The vulnerability impacts the integrity of the system by enabling unauthorized account creation, which could be leveraged for privilege escalation or lateral movement within the affected environment. The CVSS 3.0 base score is 4.3, reflecting a medium severity due to the requirement of some privileges (PR:L) and no direct impact on confidentiality or availability. No public exploits or active exploitation have been reported to date. The vulnerability is particularly relevant for environments where LogStare Collector is used for log aggregation and monitoring, as unauthorized accounts could undermine the security monitoring process or provide attackers with persistent access.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized user account creation within LogStare Collector deployments, potentially leading to privilege escalation and unauthorized access to log data or system controls. This could compromise the integrity of security monitoring and incident detection, undermining trust in log data and enabling attackers to hide their activities. Organizations in sectors relying heavily on log management for compliance and security, such as finance, energy, and critical infrastructure, may face increased risk. The medium severity score indicates moderate risk, but the potential for internal misuse or lateral movement elevates concern. If exploited, attackers could gain footholds within monitoring infrastructure, complicating incident response and increasing the likelihood of broader compromise. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially in environments with weak internal access controls or exposed management interfaces.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Restrict network access to the LogStare Collector UserRegistration endpoint by applying firewall rules or network segmentation to limit exposure to trusted administrative hosts only. 2) Monitor logs and audit trails for unusual user account creation activities or unexpected HTTP requests targeting the UserRegistration functionality. 3) Enforce strict internal access controls and least privilege principles to minimize the number of users with access to LogStare Collector interfaces. 4) Engage with LogStare Inc. to obtain patches or updates addressing this vulnerability as soon as they become available and prioritize timely deployment. 5) Consider deploying Web Application Firewalls (WAFs) or intrusion detection systems (IDS) with custom rules to detect and block crafted HTTP requests attempting unauthorized user creation. 6) Conduct internal security awareness and training to ensure administrators recognize signs of exploitation attempts. 7) Regularly review and harden configuration settings of LogStare Collector to disable or restrict unnecessary registration or user management features if possible.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-11-10T08:14:00.950Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 6920092a04dd2c5f9994c00c
Added to database: 11/21/2025, 6:39:38 AM
Last enriched: 11/28/2025, 7:49:57 AM
Last updated: 1/7/2026, 5:24:02 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.