Home

Description

Traccar is an open source GPS tracking system. Default installs of Traccar on Windows between versions 6.1- 6.8.1 and non default installs between versions 5.8 - 6.0 are vulnerable to unauthenticated local file inclusion attacks which can lead to leakage of passwords or any file on the file system including the Traccar configuration file. Versions 5.8 - 6.0 are only vulnerable if <entry key='web.override'>./override</entry> is set in the configuration file. Versions 6.1 - 6.8.1 are vulnerable by default as the web override is enabled by default. The vulnerable code is removed in version 6.9.0.

PUBLISHED Reserved 2025-09-29 | Published 2025-10-02 | Updated 2025-10-03 | Assigner GitHub_M




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

>= 5.8, < 6.9.0
affected

References

github.com/...raccar/security/advisories/GHSA-hprc-rph8-fj87

github.com/...va/org/traccar/web/DefaultOverrideServlet.java

projectblack.io/blog/jetty-addpath-lfi

cve.org (CVE-2025-61666)

nvd.nist.gov (CVE-2025-61666)

Download JSON