Description
Versions of the Traccar open-source GPS tracking system starting with 6.11.1 contain an issue in which authenticated users can execute arbitrary JavaScript in the context of other users' browsers by uploading malicious SVG files as device images. The application accepts SVG file uploads without sanitization and serves them with the `image/svg+xml` Content-Type, allowing embedded JavaScript to execute when victims view the image. As of time of publication, it is unclear whether a fix is available.
INFO
Published Date :
2026-02-23T21:01:21.600Z
Last Modified :
2026-02-25T15:17:46.508Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-25648 vulnerability.
| Vendors | Products |
|---|---|
| Traccar |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-25648.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact