CVE-2026-23521

6.5 MEDIUM

📋 TL;DR

This vulnerability allows authenticated users in Traccar GPS tracking systems to write files outside the intended media directory by setting a device's uniqueId to an absolute path. Attackers could potentially upload malicious files to arbitrary locations on the server. All Traccar instances up to version 6.11.1 are affected.

💻 Affected Systems

Products:
  • Traccar GPS Tracking System
Versions: All versions up to and including 6.11.1
Operating Systems: All platforms running Traccar
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with device creation/edit permissions. All default installations are vulnerable if users have these permissions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could write malicious files (webshells, backdoors) to sensitive system directories, potentially leading to remote code execution and full server compromise.

🟠

Likely Case

Authenticated users could write files outside the media directory, potentially disrupting system operations or storing malicious content in unexpected locations.

🟢

If Mitigated

With proper access controls limiting which users can create/edit devices, impact is limited to authorized users who might abuse their privileges.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with device management permissions. The vulnerability is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://github.com/traccar/traccar/security/advisories/GHSA-rc28-cvfc-chqr

Restart Required: Yes

Instructions:

1. Monitor the Traccar GitHub repository for security updates. 2. When a patched version is released, update Traccar to the latest version. 3. Restart the Traccar service after updating.

🔧 Temporary Workarounds

Restrict Device Management Permissions

all

Limit which authenticated users can create or edit devices to only trusted administrators.

Implement File System Restrictions

linux

Use operating system permissions to restrict the Traccar process from writing outside the media directory.

chroot jail the Traccar process or use containerization with restricted filesystem access

🧯 If You Can't Patch

  • Implement strict access controls to limit device creation/edit permissions to essential administrators only.
  • Monitor file system writes by the Traccar process and alert on writes outside the media directory.

🔍 How to Verify

Check if Vulnerable:

Check your Traccar version. If it's 6.11.1 or earlier, you are vulnerable if users have device management permissions.

Check Version:

Check the Traccar web interface admin panel or examine the application version in configuration files.

Verify Fix Applied:

After updating to a patched version, test that setting an absolute path as device uniqueId no longer allows file writes outside the media directory.

📡 Detection & Monitoring

Log Indicators:

  • File write operations outside the expected media directory path
  • Device creation/modification with unusual uniqueId values containing path traversal characters

Network Indicators:

  • HTTP POST requests to device creation/update endpoints with suspicious uniqueId parameters

SIEM Query:

source="traccar" AND (event="device_create" OR event="device_update") AND uniqueId CONTAINS "/" OR uniqueId CONTAINS ".."

🔗 References

📤 Share & Export