CVE-2025-69251

free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, remote attackers can inject control characters (e.g., %00) into the ueId parameter, triggering internal URL parsing errors (net/url: invalid control character). This exposes system implementation details and can aid in service fingerprinting. All deployments of free5GC using the UDM Nudm_UECM service may be affected. free5gc/udm pull request 76 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended.
Configurations

Configuration 1 (hide)

cpe:2.3:a:free5gc:udm:*:*:*:*:*:go:*:*

History

25 Feb 2026, 16:46

Type Values Removed Values Added
First Time Free5gc udm
Free5gc
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
References () https://github.com/free5gc/free5gc/issues/751 - () https://github.com/free5gc/free5gc/issues/751 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/free5gc/free5gc/issues/76 - () https://github.com/free5gc/free5gc/issues/76 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/free5gc/free5gc/security/advisories/GHSA-pwxh-4qh4-hgpq - () https://github.com/free5gc/free5gc/security/advisories/GHSA-pwxh-4qh4-hgpq - Vendor Advisory
References () https://github.com/free5gc/udm/commit/504b14458d156558b3c0ade7107b86b3d5e72998 - () https://github.com/free5gc/udm/commit/504b14458d156558b3c0ade7107b86b3d5e72998 - Patch
Summary
  • (es) free5gc UDM proporciona Gestión Unificada de Datos (UDM) para free5GC, un proyecto de código abierto para redes móviles de quinta generación (5G). En versiones hasta la 1.4.1 inclusive, atacantes remotos pueden inyectar caracteres de control (p. ej., %00) en el parámetro ueId, lo que desencadena errores internos de análisis de URL (net/url: invalid control character). Esto expone detalles de implementación del sistema y puede ayudar en la identificación de servicios (service fingerprinting). Todas las implementaciones de free5GC que utilizan el servicio UDM Nudm_UECM pueden verse afectadas. La solicitud de extracción 76 de free5gc/udm contiene una corrección para el problema. No hay una solución alternativa directa disponible a nivel de aplicación. Se recomienda aplicar el parche oficial.
CPE cpe:2.3:a:free5gc:udm:*:*:*:*:*:go:*:*

24 Feb 2026, 01:16

Type Values Removed Values Added
Summary (en) free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, remote attackers can inject control characters (e.g., %00) into the ueId parameter, triggering internal URL parsing errors (net/url: invalid control character). This exposes system implementation details and can aid in service fingerprinting. All deployments of free5GC using the UDM Nudm_UECM service may be affected. free5gc/udm pull request 76 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended. (en) free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, remote attackers can inject control characters (e.g., %00) into the ueId parameter, triggering internal URL parsing errors (net/url: invalid control character). This exposes system implementation details and can aid in service fingerprinting. All deployments of free5GC using the UDM Nudm_UECM service may be affected. free5gc/udm pull request 76 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended.

24 Feb 2026, 00:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-24 00:16

Updated : 2026-02-25 16:46


NVD link : CVE-2025-69251

Mitre link : CVE-2025-69251

CVE.ORG link : CVE-2025-69251


JSON object : View

Products Affected

free5gc

  • udm
CWE
CWE-20

Improper Input Validation