Versions of the Traccar open-source GPS tracking system up to and including 6.11.1 contain an issue in which authenticated users who can create or edit devices can set a device `uniqueId` to an absolute path. When uploading a device image, Traccar uses that `uniqueId` to build the filesystem path without enforcing that the resolved path stays under the media root. This allows writing files outside the media directory. As of time of publication, it is unclear whether a fix is available.
Metrics
Affected Vendors & Products
References
History
Mon, 23 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Versions of the Traccar open-source GPS tracking system up to and including 6.11.1 contain an issue in which authenticated users who can create or edit devices can set a device `uniqueId` to an absolute path. When uploading a device image, Traccar uses that `uniqueId` to build the filesystem path without enforcing that the resolved path stays under the media root. This allows writing files outside the media directory. As of time of publication, it is unclear whether a fix is available. | |
| Title | Traccar vulnerable to Path Traversal and External Control of File Name or Path | |
| Weaknesses | CWE-22 CWE-73 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-23T20:57:31.195Z
Reserved: 2026-01-13T18:22:43.980Z
Link: CVE-2026-23521
No data.
Status : Received
Published: 2026-02-23T21:19:09.990
Modified: 2026-02-23T21:19:09.990
Link: CVE-2026-23521
No data.
OpenCVE Enrichment
No data.