Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-0305

NIXPKGS-2026-0305
published on
Permalink CVE-2025-68930
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 2 months, 1 week ago by @mweinelt Activity log
  • Created suggestion
  • @mweinelt ignored
    7 packages
    • python312Packages.pytraccar
    • python313Packages.pytraccar
    • python314Packages.pytraccar
    • home-assistant-component-tests.traccar
    • tests.home-assistant-component-tests.traccar
    • home-assistant-component-tests.traccar_server
    • tests.home-assistant-component-tests.traccar_server
  • @mweinelt accepted
  • @mweinelt published on GitHub
Traccar Missing Origin Validation in WebSockets

Versions of the Traccar open-source GPS tracking system up to and including 6.11.1 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability in the `/api/socket` endpoint. The application fails to validate the `Origin` header during the WebSocket handshake. This allows a remote attacker to bypass the Same Origin Policy (SOP) and establish a full-duplex WebSocket connection using a legitimate user's credentials (JSESSIONID). As of time of publication, it is unclear whether a fix is available.

Affected products

traccar
  • ==<= 6.11.1

Matching in nixpkgs

Ignored packages (7)

Package maintainers

https://github.com/traccar/traccar/security/advisories/GHSA-69x6-wcx2-vghp