Versions of the Traccar open-source GPS tracking system up to and including 6.11.1 contain an issue in which authenticated users who can create or edit devices can set a device `uniqueId` to an absolute path. When uploading a device image, Traccar uses that `uniqueId` to build the filesystem path without enforcing that the resolved path stays under the media root. This allows writing files outside the media directory. As of time of publication, it is unclear whether a fix is available.
References
| Link | Resource |
|---|---|
| https://github.com/traccar/traccar/security/advisories/GHSA-rc28-cvfc-chqr | Exploit Mitigation Vendor Advisory |
Configurations
History
26 Feb 2026, 16:27
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| First Time |
Traccar
Traccar traccar |
|
| CPE | cpe:2.3:a:traccar:traccar:*:*:*:*:*:*:*:* | |
| References | () https://github.com/traccar/traccar/security/advisories/GHSA-rc28-cvfc-chqr - Exploit, Mitigation, Vendor Advisory |
23 Feb 2026, 21:19
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-23 21:19
Updated : 2026-02-26 16:27
NVD link : CVE-2026-23521
Mitre link : CVE-2026-23521
CVE.ORG link : CVE-2026-23521
JSON object : View
Products Affected
traccar
- traccar
