CVE-2025-68930

Versions of the Traccar open-source GPS tracking system up to and including 6.11.1 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability in the `/api/socket` endpoint. The application fails to validate the `Origin` header during the WebSocket handshake. This allows a remote attacker to bypass the Same Origin Policy (SOP) and establish a full-duplex WebSocket connection using a legitimate user's credentials (JSESSIONID). As of time of publication, it is unclear whether a fix is available.
References
Link Resource
https://github.com/traccar/traccar/security/advisories/GHSA-69x6-wcx2-vghp Vendor Advisory Exploit Mitigation
Configurations

Configuration 1 (hide)

cpe:2.3:a:traccar:traccar:*:*:*:*:*:*:*:*

History

26 Feb 2026, 16:30

Type Values Removed Values Added
References () https://github.com/traccar/traccar/security/advisories/GHSA-69x6-wcx2-vghp - () https://github.com/traccar/traccar/security/advisories/GHSA-69x6-wcx2-vghp - Vendor Advisory, Exploit, Mitigation
CPE cpe:2.3:a:traccar:traccar:*:*:*:*:*:*:*:*
Summary
  • (es) Las versiones del sistema de seguimiento GPS de código abierto Traccar hasta la 6.11.1 inclusive contienen una vulnerabilidad de Secuestro de WebSocket entre Sitios (CSWSH) en el endpoint `/api/socket`. La aplicación no valida el encabezado 'Origin' durante el handshake de WebSocket. Esto permite a un atacante remoto eludir la Política del Mismo Origen (SOP) y establecer una conexión WebSocket full-duplex utilizando las credenciales de un usuario legítimo (JSESSIONID). En el momento de la publicación, no está claro si hay una solución disponible.
First Time Traccar
Traccar traccar

23 Feb 2026, 21:19

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-23 21:19

Updated : 2026-02-26 16:30


NVD link : CVE-2025-68930

Mitre link : CVE-2025-68930

CVE.ORG link : CVE-2025-68930


JSON object : View

Products Affected

traccar

  • traccar
CWE
CWE-1385

Missing Origin Validation in WebSockets