Cyber Posture

CVE-2026-25649

HighPublic PoC

Published: 23 February 2026

Published
23 February 2026
Modified
26 February 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
EPSS Score 0.0002 6.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-25649 is a high-severity CSRF (CWE-352) vulnerability in Traccar Traccar. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-352 CWE-601

Awareness training educates users on avoiding untrusted links and actions that can be exploited via CSRF.

addresses: CWE-352

Requiring user re-entry of credentials for sensitive actions prevents automated forgery of requests without active user participation.

addresses: CWE-352

Security testing regimens explicitly include checks for missing or ineffective anti-CSRF protections in web applications.

addresses: CWE-601

Validates redirect targets and URLs to ensure they conform to allowed destinations.

addresses: CWE-352

Detects anomalous request patterns consistent with cross-site request forgery.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1528 Steal Application Access Token Credential Access
Adversaries can steal application access tokens as a means of acquiring credentials to access remote systems and resources.
Why these techniques?

Open redirect in public OIDC endpoints (T1190) directly enables theft of OAuth authorization codes leading to access tokens (T1528) and subsequent account takeover.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Versions of the Traccar open-source GPS tracking system up to and including 6.11.1 contain an issue in which authenticated users can steal OAuth 2.0 authorization codes by exploiting an open redirect vulnerability in two OIDC-related endpoints. The `redirect_uri` parameter is…

more

not validated against a whitelist, allowing attackers to redirect authorization codes to attacker-controlled URLs, enabling account takeover on any OAuth-integrated application. As of time of publication, it is unclear whether a fix is available.

Deeper analysisAI

CVE-2026-25649 is an open redirect vulnerability (CWE-601, CWE-352) in two OpenID Connect (OIDC)-related endpoints of the Traccar open-source GPS tracking system, affecting all versions up to and including 6.11.1. The flaw stems from a lack of validation for the `redirect_uri` parameter against a whitelist, enabling authenticated users to manipulate OAuth 2.0 authorization code redirects.

Authenticated attackers with low privileges can exploit this vulnerability remotely (AV:N) with low complexity (AC:L), though it requires user interaction (UI:R). By controlling the `redirect_uri`, they can steal authorization codes and redirect them to attacker-controlled URLs, achieving account takeover on any OAuth-integrated application and resulting in high confidentiality and integrity impacts (CVSS:3.1 score of 7.3; C:H/I:H/A:N/S:U).

The primary advisory, published on GitHub at https://github.com/traccar/traccar/security/advisories/GHSA-ccc7-4r59-4pp7 on 2026-02-23, describes the issue but notes that as of the time of publication, it is unclear whether a fix is available. Security practitioners should monitor for updates and consider restricting authenticated access or disabling OIDC endpoints until mitigation is confirmed.

Details

CWE(s)

Affected Products

traccar
traccar
≤ 6.11.1

CVEs Like This One

CVE-2026-25648Same product: Traccar Traccar
CVE-2025-68930Same product: Traccar Traccar
CVE-2026-3872Shared CWE-601
CVE-2026-4984Shared CWE-352
CVE-2025-2319Shared CWE-352
CVE-2025-23803Shared CWE-352
CVE-2025-25071Shared CWE-352
CVE-2025-23821Shared CWE-352
CVE-2025-30615Shared CWE-352
CVE-2025-22814Shared CWE-352

References