CVE-2025-62189: Incorrect authorization in LogStare Inc. LogStare Collector (for Windows)
LogStare Collector contains an incorrect authorization vulnerability in UserRegistration. If exploited, a non-administrative user may create a new user account by sending a crafted HTTP request.
AI Analysis
Technical Summary
CVE-2025-62189 is a security vulnerability identified in LogStare Collector for Windows, specifically affecting versions 2.4.1 and earlier. The flaw resides in the UserRegistration functionality, where improper authorization checks allow a non-administrative user to create new user accounts by sending specially crafted HTTP requests. This bypasses intended access controls, enabling unauthorized privilege escalation within the application environment. The vulnerability is remotely exploitable over the network without requiring user interaction, but it does require the attacker to have some level of existing privileges (non-administrative user). The impact primarily affects the integrity of the system by allowing unauthorized account creation, which could be leveraged for further attacks or persistence. The CVSS 3.0 base score of 4.3 reflects a medium severity, considering the attack vector is network-based, the attack complexity is low, privileges required are low, and no user interaction is needed. There is no direct impact on confidentiality or availability. No public exploits have been reported yet, and no patches are linked in the provided data, indicating that organizations should monitor vendor advisories closely. The vulnerability highlights the importance of strict authorization checks in user management components of security monitoring tools like LogStare Collector.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized creation of user accounts within LogStare Collector, potentially allowing attackers to escalate privileges or maintain persistence in security monitoring environments. This could undermine the integrity of log collection and analysis, leading to inaccurate or manipulated security data. Critical infrastructure operators and enterprises relying on LogStare for centralized log management could face increased risk of insider-like attacks or lateral movement within their networks. Although confidentiality and availability are not directly impacted, the integrity compromise could delay detection of malicious activities or facilitate stealthy attacks. The medium severity suggests that while the risk is not critical, it is significant enough to warrant prompt attention, especially in regulated sectors such as finance, energy, and government agencies across Europe. The absence of known exploits reduces immediate risk but does not eliminate the threat of future exploitation.
Mitigation Recommendations
Organizations should immediately verify if they are running LogStare Collector version 2.4.1 or earlier and plan to upgrade to a patched version once available from LogStare Inc. In the interim, restrict network access to the UserRegistration endpoint by implementing firewall rules or network segmentation to limit exposure to trusted administrative hosts only. Monitor logs for unusual user account creation activities or unexpected HTTP requests targeting the registration functionality. Employ application-layer firewalls or intrusion detection systems to detect and block crafted HTTP requests attempting to exploit this vulnerability. Review and tighten user privilege assignments to minimize the number of users with any registration capabilities. Conduct regular audits of user accounts within LogStare Collector to identify and remove unauthorized accounts promptly. Engage with the vendor for timely patch releases and security advisories. Additionally, consider implementing multi-factor authentication for administrative access to reduce the risk of unauthorized account misuse.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland, Belgium, Finland
CVE-2025-62189: Incorrect authorization in LogStare Inc. LogStare Collector (for Windows)
Description
LogStare Collector contains an incorrect authorization vulnerability in UserRegistration. If exploited, a non-administrative user may create a new user account by sending a crafted HTTP request.
AI-Powered Analysis
Technical Analysis
CVE-2025-62189 is a security vulnerability identified in LogStare Collector for Windows, specifically affecting versions 2.4.1 and earlier. The flaw resides in the UserRegistration functionality, where improper authorization checks allow a non-administrative user to create new user accounts by sending specially crafted HTTP requests. This bypasses intended access controls, enabling unauthorized privilege escalation within the application environment. The vulnerability is remotely exploitable over the network without requiring user interaction, but it does require the attacker to have some level of existing privileges (non-administrative user). The impact primarily affects the integrity of the system by allowing unauthorized account creation, which could be leveraged for further attacks or persistence. The CVSS 3.0 base score of 4.3 reflects a medium severity, considering the attack vector is network-based, the attack complexity is low, privileges required are low, and no user interaction is needed. There is no direct impact on confidentiality or availability. No public exploits have been reported yet, and no patches are linked in the provided data, indicating that organizations should monitor vendor advisories closely. The vulnerability highlights the importance of strict authorization checks in user management components of security monitoring tools like LogStare Collector.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized creation of user accounts within LogStare Collector, potentially allowing attackers to escalate privileges or maintain persistence in security monitoring environments. This could undermine the integrity of log collection and analysis, leading to inaccurate or manipulated security data. Critical infrastructure operators and enterprises relying on LogStare for centralized log management could face increased risk of insider-like attacks or lateral movement within their networks. Although confidentiality and availability are not directly impacted, the integrity compromise could delay detection of malicious activities or facilitate stealthy attacks. The medium severity suggests that while the risk is not critical, it is significant enough to warrant prompt attention, especially in regulated sectors such as finance, energy, and government agencies across Europe. The absence of known exploits reduces immediate risk but does not eliminate the threat of future exploitation.
Mitigation Recommendations
Organizations should immediately verify if they are running LogStare Collector version 2.4.1 or earlier and plan to upgrade to a patched version once available from LogStare Inc. In the interim, restrict network access to the UserRegistration endpoint by implementing firewall rules or network segmentation to limit exposure to trusted administrative hosts only. Monitor logs for unusual user account creation activities or unexpected HTTP requests targeting the registration functionality. Employ application-layer firewalls or intrusion detection systems to detect and block crafted HTTP requests attempting to exploit this vulnerability. Review and tighten user privilege assignments to minimize the number of users with any registration capabilities. Conduct regular audits of user accounts within LogStare Collector to identify and remove unauthorized accounts promptly. Engage with the vendor for timely patch releases and security advisories. Additionally, consider implementing multi-factor authentication for administrative access to reduce the risk of unauthorized account misuse.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-11-10T08:14:00.950Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 6920092a04dd2c5f9994c00c
Added to database: 11/21/2025, 6:39:38 AM
Last enriched: 11/21/2025, 6:53:45 AM
Last updated: 11/22/2025, 3:02:39 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65947: CWE-400: Uncontrolled Resource Consumption in jzeuzs thread-amount
HighCVE-2025-65946: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in RooCodeInc Roo-Code
HighCVE-2025-12678
UnknownCVE-2025-11933: CWE-20 Improper Input Validation in wofSSL wolfSSL
LowCVE-2025-65111: CWE-277: Insecure Inherited Permissions in authzed spicedb
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.