Home

Description

Traccar is an open source GPS tracking system. In org.traccar:traccar versions starting at 6.11.1 before 6.13.0, the email notification templates insert user-controlled device, geofence, and driver names into HTML email output without proper escaping. An attacker with low privileges can store crafted HTML in these fields, which is then rendered in notification emails sent to other users with access to the affected devices. This can lead to phishing or spoofed email content. This issue is fixed in version 6.13.0.

PUBLISHED Reserved 2026-02-23 | Published 2026-05-05 | Updated 2026-05-05 | Assigner GitHub_M




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

>= 6.11.1, < 6.13.0
affected

References

github.com/...raccar/security/advisories/GHSA-6hfr-mj4m-hrvv exploit

github.com/...raccar/security/advisories/GHSA-6hfr-mj4m-hrvv

cve.org (CVE-2026-27694)

nvd.nist.gov (CVE-2026-27694)

Download JSON