CVE-2026-27693
Received Received - Intake
XML Injection in Traccar GPS Tracking System

Publication date: 2026-05-05

Last updated on: 2026-05-06

Assigner: GitHub, Inc.

Description
Traccar is an open source GPS tracking system. In org.traccar:traccar versions starting at 6.11.1 before 6.13.0, the KML and GPX export functionality writes device names to XML output without proper escaping. An attacker with low privileges can create a device with a crafted name that injects XML content into exported files. If another user exports and opens the affected KML or GPX file, this can corrupt the file structure and spoof exported location data. This issue is fixed in version 6.13.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-05
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-05
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
traccar traccar From 6.11.1 (inc) to 6.13.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-91 The product does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an attacker to inject malicious XML content into exported GPS tracking files, which can lead to data manipulation and spoofing of location data.

Such manipulation and potential data corruption could undermine the integrity and reliability of exported data, which may impact compliance with standards and regulations that require data accuracy and protection against unauthorized data alteration, such as GDPR and HIPAA.

However, the provided information does not explicitly detail the direct effects on compliance with these regulations.


Can you explain this vulnerability to me?

CVE-2026-27693 is a moderate severity XML injection vulnerability in the Traccar GPS tracking software affecting versions 6.11.1 up to but not including 6.13.0.

The vulnerability occurs in the KML and GPX export functionality where device names are written directly into XML output without proper escaping.

An attacker with low privileges can create a device with a specially crafted name containing XML special characters or payloads. When another user exports and opens the affected KML or GPX file, this injected XML content can corrupt the file structure and spoof exported location data.

This can lead to injection of fake GPS data, descriptions, or other content appearing in exported files viewed in applications like Google Earth.

Additionally, if the exported files are processed by vulnerable XML parsers, this issue could potentially lead to XML External Entity (XXE) attacks.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker to manipulate exported GPS data files.

  • Corruption of exported KML or GPX files, making them unreliable or unusable.
  • Spoofing of location data, which can mislead users relying on accurate GPS tracking information.
  • Injection of fake descriptions or other malicious content into exported files.
  • Potential exposure to XML External Entity (XXE) attacks if the exported files are processed by vulnerable XML parsers, possibly leading to unauthorized file access or data disclosure.

Overall, this can undermine the integrity and trustworthiness of GPS tracking data and exported reports.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by examining exported KML or GPX files for suspicious or malformed XML content, especially device names containing XML special characters or payloads that could indicate injection attempts.

You can also monitor the creation of devices with unusual or suspicious names that include XML special characters such as <, >, &, ', or ".

While no specific commands are provided in the resources, a practical approach is to use XML validation tools or scripts to parse exported files and check for XML structure corruption or unexpected entities.

  • Use command-line XML parsers like xmllint to validate exported files: xmllint --noout exported_file.kml
  • Search for suspicious device names in the database or application logs that contain XML special characters using grep or SQL queries.

What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade Traccar to version 6.13.0 or later, where the vulnerability is fixed by properly escaping device names in XML output.

Until the upgrade can be performed, restrict the ability of low-privileged users to create or modify device names to prevent injection of malicious XML content.

Implement input validation to reject device names containing XML special characters or potentially malicious payloads.

Avoid opening exported KML or GPX files from untrusted sources in XML parsers or applications that might be vulnerable to XML injection or XXE attacks.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart