A vulnerability was identified in Open5GS up to 2.7.5. This vulnerability affects the function sgwc_bearer_add of the file src/sgwc/context.c. The manipulation leads to reachable assertion. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. The issue report is flagged as already-fixed.
References
| Link | Resource |
|---|---|
| https://github.com/open5gs/open5gs/ | |
| https://github.com/open5gs/open5gs/issues/4233 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/open5gs/open5gs/issues/4233#issue-3776216182 | Exploit Issue Tracking Vendor Advisory |
| https://vuldb.com/?ctiid.341598 | Permissions Required VDB Entry |
| https://vuldb.com/?id.341598 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.729339 | Third Party Advisory VDB Entry |
Configurations
History
23 Feb 2026, 09:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
09 Feb 2026, 20:38
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/open5gs/open5gs/issues/4233 - Exploit, Issue Tracking, Vendor Advisory | |
| References | () https://github.com/open5gs/open5gs/issues/4233#issue-3776216182 - Exploit, Issue Tracking, Vendor Advisory | |
| References | () https://vuldb.com/?ctiid.341598 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.341598 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.729339 - Third Party Advisory, VDB Entry | |
| CPE | cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:* | |
| First Time |
Open5gs open5gs
Open5gs |
17 Jan 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-17 16:16
Updated : 2026-02-23 09:16
NVD link : CVE-2025-15531
Mitre link : CVE-2025-15531
CVE.ORG link : CVE-2025-15531
JSON object : View
Products Affected
open5gs
- open5gs
CWE
CWE-617
Reachable Assertion
