CVE-2026-25648

Versions of the Traccar open-source GPS tracking system starting with 6.11.1 contain an issue in which authenticated users can execute arbitrary JavaScript in the context of other users' browsers by uploading malicious SVG files as device images. The application accepts SVG file uploads without sanitization and serves them with the `image/svg+xml` Content-Type, allowing embedded JavaScript to execute when victims view the image. As of time of publication, it is unclear whether a fix is available.
References
Link Resource
https://github.com/traccar/traccar/security/advisories/GHSA-mc2g-mjqh-8x78 Exploit Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:traccar:traccar:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-23 21:19

Updated : 2026-02-26 16:25


NVD link : CVE-2026-25648

Mitre link : CVE-2026-25648

CVE.ORG link : CVE-2026-25648


JSON object : View

Products Affected

traccar

  • traccar
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-434

Unrestricted Upload of File with Dangerous Type