CVE-2026-27644
Received Received - Intake
CSV Formula Injection in Traccar GPS Tracking System

Publication date: 2026-05-05

Last updated on: 2026-05-05

Assigner: GitHub, Inc.

Description
Traccar is an open source GPS tracking system. In versions between 6.11.1 and 6.13.0, the CSV export functionality writes position data, including user-controlled device and computed attributes, to CSV output without proper escaping. An attacker can inject spreadsheet formulas through exported fields. When a manager or administrator opens the exported CSV file in spreadsheet software, this can cause formula execution and lead to command execution or data exfiltration. This has been patched in version 6.13.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-05
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-05-05
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
traccar traccar From 6.11.1 (inc) to 6.13.0 (inc)
traccar traccar 6.13.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1236 The product saves user-provided information into a Comma-Separated Value (CSV) file, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as a command when the file is opened by a spreadsheet product.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The CSV Injection vulnerability in Traccar allows attackers to inject malicious spreadsheet formulas into exported CSV files, which can lead to arbitrary command execution or data exfiltration when opened by managers or administrators.

Such unauthorized data access or exfiltration could potentially violate data protection regulations like GDPR or HIPAA, which require safeguarding personal and sensitive data against unauthorized disclosure or processing.

Therefore, this vulnerability poses a risk to compliance with these standards by enabling attackers to exploit exported data files to compromise confidentiality and integrity of sensitive information.


Can you explain this vulnerability to me?

CVE-2026-27644 is a CSV Injection (Formula Injection) vulnerability in the Traccar GPS tracking software, specifically affecting the CSV export functionality in versions 6.11.1 through 6.13.0.

The vulnerability occurs because position data, including user-controlled device and computed attributes, is written directly to CSV output without proper escaping or sanitization.

An attacker can inject malicious spreadsheet formulas into these exported fields. When a manager or administrator opens the exported CSV file in spreadsheet software such as Excel, LibreOffice Calc, or Google Sheets, these formulas can execute.

This execution can lead to arbitrary command execution, data exfiltration, phishing attacks, or corruption of the CSV structure.

The root cause is the lack of proper escaping or neutralization of formula elements in the CSV export code, specifically in the CsvExportProvider.java file.

The vulnerability has been patched in version 6.13.0 by implementing proper CSV escaping or neutralization techniques.


How can this vulnerability impact me? :

If you use the affected versions of Traccar and export position data to CSV files, an attacker could inject malicious spreadsheet formulas into the exported data.

When a manager or administrator opens the exported CSV file in spreadsheet software, these formulas can execute, potentially leading to:

  • Arbitrary command execution on the user's system.
  • Data exfiltration, where sensitive information could be leaked.
  • Phishing attacks by manipulating spreadsheet content.
  • Corruption or disruption of CSV file structure, affecting data integrity.

The vulnerability requires low privileges to exploit but does require user interaction (opening the CSV file).


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by examining exported CSV files from the Traccar system for the presence of unescaped spreadsheet formulas in position data or device attributes.

Specifically, look for CSV fields starting with characters like '=', '+', '-', or '@' which indicate potential formula injection.

You can use command-line tools to search for such patterns in exported CSV files. For example, using grep on Linux or macOS:

  • grep -E '^(=|\+|-|@)' exported_file.csv

Additionally, scanning logs or monitoring network traffic for CSV export requests from versions 6.11.1 to 6.13.0 can help identify if vulnerable exports are being generated.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade the Traccar software to version 6.13.0 or later, where this vulnerability has been patched.

If upgrading is not immediately possible, avoid opening exported CSV files from affected versions in spreadsheet software without first sanitizing or escaping the data.

Implement CSV escaping or prefix potentially dangerous fields with a single quote to neutralize formulas before opening or sharing CSV files.

Restrict access to CSV exports to trusted users only, and educate users about the risks of opening untrusted CSV files.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart