Unrated severityNVD Advisory· Published Feb 23, 2026· Updated Feb 25, 2026
Traccar Missing Origin Validation in WebSockets
CVE-2025-68930
Description
Versions of the Traccar open-source GPS tracking system up to and including 6.11.1 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability in the /api/socket endpoint. The application fails to validate the Origin header during the WebSocket handshake. This allows a remote attacker to bypass the Same Origin Policy (SOP) and establish a full-duplex WebSocket connection using a legitimate user's credentials (JSESSIONID). As of time of publication, it is unclear whether a fix is available.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/traccar/traccar/security/advisories/GHSA-69x6-wcx2-vghpmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.