๐Ÿ” CVE Alert

CVE-2026-27693

MEDIUM 5.4

traccar allows XML injection in KML and GPX exports

CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
0th

Traccar is an open source GPS tracking system. In org.traccar:traccar versions starting at 6.11.1 before 6.13.0, the KML and GPX export functionality writes device names to XML output without proper escaping. An attacker with low privileges can create a device with a crafted name that injects XML content into exported files. If another user exports and opens the affected KML or GPX file, this can corrupt the file structure and spoof exported location data. This issue is fixed in version 6.13.0.

CWE CWE-91
Vendor traccar
Product traccar
Published May 5, 2026
Last Updated May 5, 2026
Stay Ahead of the Next One

Get instant alerts for traccar traccar

Be the first to know when new medium vulnerabilities affecting traccar traccar are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
None
Integrity
Low
Availability
Low

Affected Versions

traccar / traccar
>= 6.11.1, < 6.13.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/traccar/traccar/security/advisories/GHSA-32pj-vrqc-x656 github.com: https://github.com/traccar/traccar/blob/v6.11.0/src/main/java/org/traccar/reports/GpxExportProvider.java#L52-L54