CVE-2026-25649

Source
https://cve.org/CVERecord?id=CVE-2026-25649
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25649.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-25649
Aliases
  • GHSA-ccc7-4r59-4pp7
Published
2026-02-23T21:12:06.040Z
Modified
2026-02-28T08:11:12.099608Z
Severity
  • 7.3 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Traccar Vulnerable to Authorization Code Theft via Open Redirect in OIDC Provider Endpoints
Details

Versions of the Traccar open-source GPS tracking system up to and including 6.11.1 contain an issue in which authenticated users can steal OAuth 2.0 authorization codes by exploiting an open redirect vulnerability in two OIDC-related endpoints. The redirect_uri parameter is not validated against a whitelist, allowing attackers to redirect authorization codes to attacker-controlled URLs, enabling account takeover on any OAuth-integrated application. As of time of publication, it is unclear whether a fix is available.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25649.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-352",
        "CWE-601"
    ]
}
References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25649.json"