Description

Versions of the Traccar open-source GPS tracking system up to and including 6.11.1 contain an issue in which authenticated users can steal OAuth 2.0 authorization codes by exploiting an open redirect vulnerability in two OIDC-related endpoints. The `redirect_uri` parameter is not validated against a whitelist, allowing attackers to redirect authorization codes to attacker-controlled URLs, enabling account takeover on any OAuth-integrated application. As of time of publication, it is unclear whether a fix is available.

INFO

Published Date :

2026-02-23T21:12:06.040Z

Last Modified :

2026-02-25T15:20:54.780Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-25649 vulnerability.

Vendors Products
Traccar
  • Traccar
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-25649.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact