Impact
Traccar allows authenticated users to upload SVG files that the system serves as image/svg+xml without sanitizing. The malicious SVG can embed JavaScript that executes when another user views the image, leading to arbitrary client‑side code execution in the victim’s browser. This stored XSS flaw is classified as CWE‑79 and CWE‑434.
Affected Systems
Open‑source Traccar GPS tracking instances that are version 6.11.1 and newer are impacted if a fix has not yet been applied. Earlier releases prior to 6.11.1 are not affected, and versions that have received a patch are no longer vulnerable.
Risk and Exploitability
The flaw scores a high CVSS of 8.7, yet the EPSS of less than 1% suggests a low field exploitation probability. It is not listed in CISA’s KEV catalog, indicating no public exploit is known. Because the vulnerability requires authenticated file upload and a victim’s interaction with the image, it mainly poses an internal risk for organizations that allow shared dashboards.
OpenCVE Enrichment