Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
8.7

Traccar GPS Tracking System Allows Malicious SVG Files to Execute JavaScript

CVE-2026-25648
Summary

Authenticated users in Traccar can upload malicious SVG files that can execute code in other users' browsers. This can lead to unauthorized actions or data breaches. Users should check the Traccar website for any available updates to fix this issue.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
traccar traccar > 6.11.1 –
Original title
Versions of the Traccar open-source GPS tracking system starting with 6.11.1 contain an issue in which authenticated users can execute arbitrary JavaScript in the context of other users' browsers b...
Original description
Versions of the Traccar open-source GPS tracking system starting with 6.11.1 contain an issue in which authenticated users can execute arbitrary JavaScript in the context of other users' browsers by uploading malicious SVG files as device images. The application accepts SVG file uploads without sanitization and serves them with the `image/svg+xml` Content-Type, allowing embedded JavaScript to execute when victims view the image. As of time of publication, it is unclear whether a fix is available.
nvd CVSS3.1 8.7
Vulnerability type
CWE-79 Cross-site Scripting (XSS)
CWE-434 Unrestricted File Upload
Published: 23 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026