CVE-2025-61949

5.4 MEDIUM

📋 TL;DR

LogStare Collector has a stored XSS vulnerability in its UserManagement feature where malicious user information can execute arbitrary scripts in victims' browsers when they access the management page. This affects all users with access to the management interface of vulnerable LogStare Collector installations.

💻 Affected Systems

Products:
  • LogStare Collector
Versions: All versions prior to 3.2.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default UserManagement functionality; no special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, perform actions as authenticated users, or deploy malware to management console users.

🟠

Likely Case

Session hijacking, credential theft, or unauthorized actions performed through the management interface.

🟢

If Mitigated

Limited to script execution in management console context with proper input validation bypassed.

🌐 Internet-Facing: HIGH if management interface is exposed to internet, as attackers can inject malicious scripts remotely.
🏢 Internal Only: MEDIUM as it requires attacker access to user management functions but can affect all management users.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires ability to create/modify user accounts in UserManagement, but exploitation is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.1

Vendor Advisory: https://www.logstare.com/vulnerability/2025-001/

Restart Required: Yes

Instructions:

1. Download LogStare Collector 3.2.1 from official vendor site. 2. Backup current configuration. 3. Stop LogStare Collector service. 4. Install/upgrade to version 3.2.1. 5. Restart LogStare Collector service. 6. Verify version and functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement web application firewall or input validation to sanitize user management inputs

Content Security Policy

all

Implement strict CSP headers to prevent script execution from untrusted sources

Add 'Content-Security-Policy: default-src 'self'; script-src 'self'' to web server headers

🧯 If You Can't Patch

  • Restrict access to UserManagement functions to trusted administrators only
  • Implement monitoring for unusual user account modifications or script-like content in user fields

🔍 How to Verify

Check if Vulnerable:

Check LogStare Collector version; if below 3.2.1, system is vulnerable. Review user management entries for script tags or malicious content.

Check Version:

logstare-collector --version

Verify Fix Applied:

After patching, verify version is 3.2.1 or higher and test user management functionality with script-like inputs to confirm sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual user account modifications
  • Script tags or JavaScript in user field entries
  • Multiple failed login attempts from management console

Network Indicators:

  • Unexpected outbound connections from management console browsers
  • Suspicious payloads in HTTP POST to user management endpoints

SIEM Query:

source="logstare" AND (event_type="user_modified" AND (user_data CONTAINS "<script>" OR user_data CONTAINS "javascript:"))

🔗 References

📤 Share & Export