CVE-2026-25649

7.3 HIGH

📋 TL;DR

This vulnerability allows authenticated users in Traccar GPS tracking systems to steal OAuth 2.0 authorization codes via open redirect in OIDC endpoints. Attackers can redirect these codes to malicious URLs, potentially enabling account takeover on OAuth-integrated applications. All Traccar deployments up to version 6.11.1 are affected.

💻 Affected Systems

Products:
  • Traccar GPS Tracking System
Versions: Up to and including 6.11.1
Operating Systems: All platforms running Traccar
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using OIDC/OAuth 2.0 integration are vulnerable. The vulnerability requires authenticated user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover on any OAuth-integrated application, potentially leading to data theft, unauthorized access to connected systems, and lateral movement across integrated platforms.

🟠

Likely Case

Attackers steal OAuth authorization codes to gain unauthorized access to user accounts on integrated applications, potentially compromising GPS tracking data and user credentials.

🟢

If Mitigated

With proper redirect_uri validation and OAuth security controls, impact is limited to unsuccessful redirect attempts that would be logged and blocked.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once access is obtained. The vulnerability is well-documented in the security advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://github.com/traccar/traccar/security/advisories/GHSA-ccc7-4r59-4pp7

Restart Required: Yes

Instructions:

1. Monitor the Traccar GitHub repository for security updates. 2. Apply the official patch when available. 3. Restart the Traccar service after patching.

🔧 Temporary Workarounds

Implement redirect_uri validation

all

Add server-side validation to ensure redirect_uri parameters match whitelisted domains before processing OIDC requests.

# Requires code modification to validate redirect_uri against allowed domains

Disable OIDC endpoints temporarily

all

Temporarily disable the vulnerable OIDC endpoints until a patch is available.

# Modify Traccar configuration to disable OIDC/OAuth integration

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Traccar servers from critical systems
  • Enable detailed logging and monitoring for OIDC endpoint access and redirect attempts

🔍 How to Verify

Check if Vulnerable:

Check Traccar version via web interface or configuration files. Versions 6.11.1 and earlier are vulnerable.

Check Version:

Check Traccar web interface or examine traccar.xml configuration file for version information

Verify Fix Applied:

After applying any fix, test OIDC redirect functionality with malicious redirect_uri parameters to ensure they are rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect patterns in OIDC logs
  • Multiple failed redirect attempts with external domains
  • Authorization codes being sent to non-whitelisted domains

Network Indicators:

  • HTTP 302 redirects to unexpected external domains from OIDC endpoints
  • Traffic patterns showing authorization codes being sent to attacker-controlled servers

SIEM Query:

source="traccar" AND (url="*/oauth/*" OR url="*/oidc/*") AND (status=302 OR status=303) AND NOT dest_domain IN ["whitelisted-domains"]

🔗 References

📤 Share & Export