CVE-2025-68930
Plain English Summary
AI-powered analysis for quick understanding
An attacker can exploit a vulnerability in the Traccar GPS tracking system to take control of a legitimate user's WebSocket connection, allowing them to send and receive data as if they were that user. This requires the attacker to trick the system into thinking their request is coming from a trusted source, which could happen if the user visits a malicious website while logged into Traccar.
Technical Description
Versions of the Traccar open-source GPS tracking system up to and including 6.11.1 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability in the `/api/socket` endpoint. The application fails to validate the `Origin` header during the WebSocket handshake. This allows a remote attacker to bypass the Same Origin Policy (SOP) and establish a full-duplex WebSocket connection using a legitimate user's credentials (JSESSIONID). As of time of publication, it is unclear whether a fix is available.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 23, 2026
about 1 month ago
Last Modified
Feb 26, 2026
about 1 month ago
Vendor
traccar
Product
traccar