free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, remote attackers can inject control characters (e.g., %00) into the ueId parameter, triggering internal URL parsing errors (net/url: invalid control character). This exposes system implementation details and can aid in service fingerprinting. All deployments of free5GC using the UDM Nudm_UECM service may be affected. free5gc/udm pull request 76 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended.
References
| Link | Resource |
|---|---|
| https://github.com/free5gc/free5gc/issues/751 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/free5gc/free5gc/issues/76 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/free5gc/free5gc/security/advisories/GHSA-pwxh-4qh4-hgpq | Vendor Advisory |
| https://github.com/free5gc/udm/commit/504b14458d156558b3c0ade7107b86b3d5e72998 | Patch |
Configurations
History
25 Feb 2026, 16:46
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Free5gc udm
Free5gc |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
| References | () https://github.com/free5gc/free5gc/issues/751 - Exploit, Issue Tracking, Vendor Advisory | |
| References | () https://github.com/free5gc/free5gc/issues/76 - Exploit, Issue Tracking, Vendor Advisory | |
| References | () https://github.com/free5gc/free5gc/security/advisories/GHSA-pwxh-4qh4-hgpq - Vendor Advisory | |
| References | () https://github.com/free5gc/udm/commit/504b14458d156558b3c0ade7107b86b3d5e72998 - Patch | |
| Summary |
|
|
| CPE | cpe:2.3:a:free5gc:udm:*:*:*:*:*:go:*:* |
24 Feb 2026, 01:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, remote attackers can inject control characters (e.g., %00) into the ueId parameter, triggering internal URL parsing errors (net/url: invalid control character). This exposes system implementation details and can aid in service fingerprinting. All deployments of free5GC using the UDM Nudm_UECM service may be affected. free5gc/udm pull request 76 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended. |
24 Feb 2026, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-24 00:16
Updated : 2026-02-25 16:46
NVD link : CVE-2025-69251
Mitre link : CVE-2025-69251
CVE.ORG link : CVE-2025-69251
JSON object : View
Products Affected
free5gc
- udm
CWE
CWE-20
Improper Input Validation
