Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-27693— traccar allows XML injection in KML and GPX exports

CVSS 5.4 · Medium EPSS 0.04% · P13
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-27693

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
traccar allows XML injection in KML and GPX exports
Source: NVD (National Vulnerability Database)
Vulnerability Description
Traccar is an open source GPS tracking system. In org.traccar:traccar versions starting at 6.11.1 before 6.13.0, the KML and GPX export functionality writes device names to XML output without proper escaping. An attacker with low privileges can create a device with a crafted name that injects XML content into exported files. If another user exports and opens the affected KML or GPX file, this can corrupt the file structure and spoof exported location data. This issue is fixed in version 6.13.0.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
XML注入(XPath盲注)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Traccar 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Traccar是美国Traccar公司的一个基于Java的可提供GPS跟踪功能的建站系统。该软件支持170多种GPS协议和1500多种型号的GPS跟踪设备。Traccar可以与任何主要的SQL数据库系统一起使用。它还提供了易于使用的REST API。 Traccar 6.11.1版本至6.13.0之前版本存在安全漏洞,该漏洞源于KML和GPX导出功能未正确转义设备名称,可能导致低权限攻击者创建带有特制名称的设备注入XML内容,当其他用户导出并打开受影响的KML或GPX文件时可能破坏文件结构并伪造导出的位置
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
traccartraccar >= 6.11.1, < 6.13.0 -

II. Public POCs for CVE-2026-27693

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-27693

登录查看更多情报信息。

Same Patch Batch · traccar · 2026-05-05 · 3 CVEs total

CVE-2026-276446.5 MEDIUMtraccar allows CSV formula injection via exported position data
CVE-2026-276945.4 MEDIUMtraccar allows stored HTML injection in notification emails

IV. Related Vulnerabilities

V. Comments for CVE-2026-27693

No comments yet


Leave a comment