Description
There is a cypher injection issue in LogonTracer prior to v2.0.0. If specially crafted Windows event log data is loaded, the contents of the database may be altered.
Published: 2026-04-27
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Database integrity compromise
Action: Patch
AI Analysis

Impact

LogonTracer contains a cypher injection vulnerability prior to version 2.0.0, allowing an attacker to alter the database contents by loading specially crafted Windows event log data. This flaw could enable unauthorized data modification, compromising the integrity of the application’s data store. The weakness falls under CWE‑943, reflecting unsanitized cypher input that can be exploited during data ingestion.

Affected Systems

Vulnerable product is LogonTracer provided by the Japan Computer Emergency Response Team Coordination Center (JPCERT/CC). Any deployment running a version earlier than 2.0.0 is susceptible; no specific minor revisions are listed, so all pre‑2.0.0 releases are considered affected.

Risk and Exploitability

The CVSS score of 5.1 indicates medium risk, while an EPSS of less than 1 % suggests low likelihood of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Exploitation would require an attacker to supply crafted event log data that LogonTracer processes, which implies either local access to the system to influence log ingestion or an exposed interface that accepts logs from external sources. Once triggered, the attacker could modify database entries, potentially altering authentication traces or other audit information.

Generated by OpenCVE AI on April 28, 2026 at 04:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade LogonTracer to version 2.0.0 or later to eliminate the cypher injection flaw.
  • When an upgrade is delayed, sanitize incoming Windows event log data before ingestion—validate and escape any characters that could form part of a cypher statement.
  • Apply the principle of least privilege to the LogonTracer process and monitor the database for unexpected changes to detect potential exploitation early.

Generated by OpenCVE AI on April 28, 2026 at 04:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Jpcert
Jpcert logontracer
CPEs cpe:2.3:a:jpcert:logontracer:*:*:*:*:*:*:*:*
Vendors & Products Jpcert
Jpcert logontracer

Tue, 28 Apr 2026 05:15:00 +0000

Type Values Removed Values Added
Title Cypher Injection in LogonTracer Permitting Database Modification

Mon, 27 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Japan Computer Emergency Response Team Coordination Center (jpcert/cc)
Japan Computer Emergency Response Team Coordination Center (jpcert/cc) logontracer
Vendors & Products Japan Computer Emergency Response Team Coordination Center (jpcert/cc)
Japan Computer Emergency Response Team Coordination Center (jpcert/cc) logontracer

Mon, 27 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 27 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Description There is a cypher injection issue in LogonTracer prior to v2.0.0. If specially crafted Windows event log data is loaded, the contents of the database may be altered.
Weaknesses CWE-943
References
Metrics cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Japan Computer Emergency Response Team Coordination Center (jpcert/cc) Logontracer
Jpcert Logontracer
cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2026-04-27T15:23:56.804Z

Reserved: 2026-04-21T23:50:58.926Z

Link: CVE-2026-33566

cve-icon Vulnrichment

Updated: 2026-04-27T15:23:52.152Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-27T00:16:20.083

Modified: 2026-04-28T18:15:39.440

Link: CVE-2026-33566

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:00:14Z

Weaknesses