CVE-2025-66719

An issue was discovered in Free5gc NRF 1.4.0. In the access-token generation logic of free5GC, the AccessTokenScopeCheck() function in file internal/sbi/processor/access_token.go bypasses all scope validation when the attacker uses a crafted targetNF value. This allows attackers to obtain an access token with any arbitrary scope.
References
Link Resource
https://github.com/free5gc/free5gc/issues/736 Exploit Issue Tracking
https://github.com/free5gc/nrf/pull/73 Issue Tracking Patch
Configurations

Configuration 1 (hide)

cpe:2.3:a:free5gc:nrf:1.4.0:*:*:*:*:*:*:*

History

11 Feb 2026, 19:55

Type Values Removed Values Added
CPE cpe:2.3:a:free5gc:nrf:1.4.0:*:*:*:*:*:*:*
First Time Free5gc nrf
Free5gc
References () https://github.com/free5gc/free5gc/issues/736 - () https://github.com/free5gc/free5gc/issues/736 - Exploit, Issue Tracking
References () https://github.com/free5gc/nrf/pull/73 - () https://github.com/free5gc/nrf/pull/73 - Issue Tracking, Patch

23 Jan 2026, 20:15

Type Values Removed Values Added
CWE CWE-863
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1

23 Jan 2026, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-23 16:15

Updated : 2026-02-11 19:55


NVD link : CVE-2025-66719

Mitre link : CVE-2025-66719

CVE.ORG link : CVE-2025-66719


JSON object : View

Products Affected

free5gc

  • nrf
CWE
CWE-863

Incorrect Authorization