FKIE_CVE-2026-25648
Vulnerability from fkie_nvd - Published: 2026-02-23 21:19 - Updated: 2026-02-26 16:25
Severity ?
Summary
Versions of the Traccar open-source GPS tracking system starting with 6.11.1 contain an issue in which authenticated users can execute arbitrary JavaScript in the context of other users' browsers by uploading malicious SVG files as device images. The application accepts SVG file uploads without sanitization and serves them with the `image/svg+xml` Content-Type, allowing embedded JavaScript to execute when victims view the image. As of time of publication, it is unclear whether a fix is available.
References
| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/traccar/traccar/security/advisories/GHSA-mc2g-mjqh-8x78 | Exploit, Mitigation, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:traccar:traccar:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7A82295B-76FF-4917-A101-0DC8A2CC2612",
"versionStartIncluding": "6.11.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Versions of the Traccar open-source GPS tracking system starting with 6.11.1 contain an issue in which authenticated users can execute arbitrary JavaScript in the context of other users\u0027 browsers by uploading malicious SVG files as device images. The application accepts SVG file uploads without sanitization and serves them with the `image/svg+xml` Content-Type, allowing embedded JavaScript to execute when victims view the image. As of time of publication, it is unclear whether a fix is available."
},
{
"lang": "es",
"value": "Versiones del sistema de seguimiento GPS de c\u00f3digo abierto Traccar a partir de la 6.11.1 contienen un problema en el que usuarios autenticados pueden ejecutar JavaScript arbitrario en el contexto de los navegadores de otros usuarios al subir archivos SVG maliciosos como im\u00e1genes de dispositivo. La aplicaci\u00f3n acepta subidas de archivos SVG sin sanitizaci\u00f3n y los sirve con el Content-Type \u0027image/svg+xml\u0027, permitiendo que el JavaScript incrustado se ejecute cuando las v\u00edctimas ven la imagen. En el momento de la publicaci\u00f3n, no est\u00e1 claro si hay una soluci\u00f3n disponible."
}
],
"id": "CVE-2026-25648",
"lastModified": "2026-02-26T16:25:24.867",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 5.8,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2026-02-23T21:19:10.690",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Mitigation",
"Vendor Advisory"
],
"url": "https://github.com/traccar/traccar/security/advisories/GHSA-mc2g-mjqh-8x78"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-434"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…