Published:2025/11/21  Last Updated:2025/11/21

JVN#77560819
Multiple vulnerabilities in LogStare Collector

Overview

LogStare Collector provided by LogStare Inc. contains multiple vulnerabilities.

Products Affected

CVE-2025-58097, CVE-2025-61949, CVE-2025-62189, CVE-2025-62687, CVE-2025-64299

  • LogStare Collector (for Windows) 2.4.1 and earlier
  • LogStare Collector (for Linux) 2.4.1 and earlier
CVE-2025-64695
  • Installer of LogStare Collector (for Windows) 2.4.1 and earlier

Description

LogStare Collector provided by LogStare Inc. contains multiple vulnerabilities listed below.

  • Incorrect default permissions for the installation directory (CWE-276)
    • CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N Base Score 6.8
    • CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N Base Score 5.5
    • CVE-2025-58097
  • Stored cross-site scripting vulnerability in UserManagement (CWE-79)
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N Base Score 4.8
    • CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N Base Score 5.4
    • CVE-2025-61949
  • Incorrect authorization in UserRegistration (CWE-863)
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N Base Score 5.3
    • CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Base Score 4.3
    • CVE-2025-62189
  • Cross-site request forgery (CWE-352)
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N Base Score 6.9
    • CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N Base Score 6.5
    • CVE-2025-62687
  • Insertion of sensitive information into sent data (CWE-201)
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N Base Score 6.9
    • CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N Base Score 4.9
    • CVE-2025-64299
  • Uncontrolled search path element (CWE-427)
    • CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 8.4
    • CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Base Score 7.8
    • CVE-2025-64695
    • This vulnerability is exploited by directing a user to download and place a crafted DLL file with the affected installer, and to execute the installer

Impact

  • A non-administrative user may manipulate files within the installation directory of the product and execute arbitrary code with the administrative privilege (CVE-2025-58097)
  • If crafted user information is stored, an arbitrary script may be executed on the web browser of the user who logs in to the product's management page (CVE-2025-61949)
  • A non-administrative user may create a new user account by sending a crafted HTTP request (CVE-2025-62189)
  • If a user views a crafted page while logged in to the product, unintended operations may be performed (CVE-2025-62687)
  • An administrative user may obtain the other users' password hashes (CVE-2025-64299)
  • Arbitrary code may be executed with the privilege of the user invoking the installer (CVE-2025-64695)

Solution

CVE-2025-58097, CVE-2025-61949, CVE-2025-62189, CVE-2025-62687, CVE-2025-64299
Update the Software
Update the software to the latest version according to the information provided by the developer.
The developer has released the following version to address this vulnerability.

  • LogStare Collector (for Windows) 2.4.2
  • LogStare Collector (for Linux) 2.4.2
CVE-2025-64695
Use the latest installer
Use the latest installer provided by the developer.

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

Kazuma Matsumoto of GMO Cybersecurity by IERAE, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2025-58097
CVE-2025-61949
CVE-2025-62189
CVE-2025-62687
CVE-2025-64299
CVE-2025-64695
JVN iPedia JVNDB-2025-000106