Traccar GPS Tracking System 6.11.1 Cross-Site WebSocket Hijacking
Traccar GPS Tracking System 6.11.1 is vulnerable to Cross-Site WebSocket Hijacking (CSWSH), enabling attackers to steal sensitive GPS data by exploiting a lack of origin validation.
Traccar GPS Tracking System, a widely used application for tracking GPS devices, is vulnerable to Cross-Site WebSocket Hijacking (CSWSH) in version 6.11.1 and earlier. Discovered in February 2026, this vulnerability stems from the application’s failure to properly validate the Origin header during WebSocket connections established via the /api/socket endpoint. An attacker can exploit this flaw to bypass the Same Origin Policy (SOP) by injecting a malicious Origin header alongside a valid JSESSIONID of a victim user. Successful exploitation allows the attacker to hijack the WebSocket connection and gain unauthorized access to real-time sensitive data, specifically GPS coordinates and device status information. This poses a significant risk to organizations relying on Traccar for secure location tracking, potentially exposing sensitive location data to unauthorized parties.
Attack Chain
- Attacker identifies a vulnerable Traccar GPS Tracking System instance running version 6.11.1 or earlier.
- Attacker obtains a valid
JSESSIONIDcookie from a legitimate user of the Traccar application, potentially through social engineering or session riding. - Attacker crafts a malicious webpage with JavaScript code to establish a WebSocket connection to the vulnerable
/api/socketendpoint. - The malicious webpage sets the
Originheader to an attacker-controlled domain (e.g.,http://hacker.com) and includes the stolenJSESSIONIDcookie in the request headers. - The Traccar server, failing to validate the
Originheader, accepts the WebSocket connection from the attacker’s webpage. - The attacker’s WebSocket connection now acts as a proxy, receiving real-time data intended for the legitimate user, including GPS coordinates and device status updates.
- The attacker logs and analyzes the streamed data, extracting sensitive information such as device locations, routes, and operational status.
- The attacker can use the stolen GPS data for malicious purposes, such as tracking assets, identifying patterns of movement, or conducting surveillance.
Impact
Successful exploitation of this CSWSH vulnerability can result in the leakage of highly sensitive real-time GPS data, including precise location coordinates and device status information. The impact can be significant for organizations using Traccar to track valuable assets, monitor employee movements, or manage logistics. A successful attack could expose sensitive operational details, compromise physical security, and enable unauthorized tracking of individuals or vehicles. While the number of affected installations is unknown, any organization using Traccar GPS Tracking System version 6.11.1 or earlier is potentially at risk.
Recommendation
- Upgrade Traccar GPS Tracking System to a version that addresses CVE-2025-68930 to prevent Cross-Site WebSocket Hijacking.
- Implement and enforce strict
Originheader validation on the WebSocket endpoint/api/socketto prevent unauthorized connections. - Deploy the provided Sigma rule to detect suspicious WebSocket connections originating from unexpected domains.
- Monitor network traffic for connections to the
/api/socketendpoint with unusualOriginheaders, as indicated in the attack chain.
Detection coverage 2
Detect Suspicious Traccar WebSocket Connection with Malicious Origin
highDetects Traccar WebSocket connections with a suspicious Origin header, indicating potential CSWSH exploitation.
Detect Traccar WebSocket Connection with Missing Origin Header
mediumDetects Traccar WebSocket connections with a missing Origin header, which can also be indicative of CSWSH attempts.
Detection queries are available on the platform. Get full rules →