free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, remote attackers can inject control characters (e.g., %00) into the supi parameter, triggering internal URL parsing errors (net/url: invalid control character). This exposes system-level error details and can be used for service fingerprinting. All deployments of free5GC using the UDM Nudm_UEAU service may be affected. free5gc/udm pull request 75 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended.
References
| Link | Resource |
|---|---|
| https://github.com/free5gc/free5gc/issues/749 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/free5gc/free5gc/security/advisories/GHSA-h4wg-rp7m-8xx4 | Vendor Advisory |
| https://github.com/free5gc/udm/commit/a7af2321ddea6368c43835f90f6d1b9d67dd2ea1 | Patch |
| https://github.com/free5gc/udm/pull/75 | Issue Tracking Patch |
Configurations
History
25 Feb 2026, 16:44
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| Summary |
|
|
| First Time |
Free5gc udm
Free5gc |
|
| CPE | cpe:2.3:a:free5gc:udm:*:*:*:*:*:go:*:* | |
| References | () https://github.com/free5gc/free5gc/issues/749 - Exploit, Issue Tracking, Vendor Advisory | |
| References | () https://github.com/free5gc/free5gc/security/advisories/GHSA-h4wg-rp7m-8xx4 - Vendor Advisory | |
| References | () https://github.com/free5gc/udm/commit/a7af2321ddea6368c43835f90f6d1b9d67dd2ea1 - Patch | |
| References | () https://github.com/free5gc/udm/pull/75 - Issue Tracking, Patch |
24 Feb 2026, 01:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-24 01:16
Updated : 2026-02-25 16:44
NVD link : CVE-2026-27642
Mitre link : CVE-2026-27642
CVE.ORG link : CVE-2026-27642
JSON object : View
Products Affected
free5gc
- udm
CWE
CWE-20
Improper Input Validation
