CVE-2026-40247

free5GC is an open-source implementation of the 5G core network. In versions 4.2.1 and below of the UDR service, the handler for reading Traffic Influence Subscriptions checks whether the influenceId path segment equals subs-to-notify, but does not return after sending the HTTP 404 response when validation fails. Execution continues and the subscription data is returned alongside the 404 response. An unauthenticated attacker with access to the 5G Service Based Interface can read arbitrary Traffic Influence Subscriptions, including SUPIs/IMSIs, DNNs, S-NSSAIs, and callback URIs, by supplying any value for the influenceId path segment. A patched version was not available at the time of publication.
References
Link Resource
https://github.com/free5gc/free5gc/security/advisories/GHSA-x5r2-r74c-3w28 Exploit Third Party Advisory Mitigation
Configurations

Configuration 1 (hide)

cpe:2.3:a:free5gc:free5gc:*:*:*:*:*:*:*:*

History

21 Apr 2026, 13:53

Type Values Removed Values Added
References () https://github.com/free5gc/free5gc/security/advisories/GHSA-x5r2-r74c-3w28 - () https://github.com/free5gc/free5gc/security/advisories/GHSA-x5r2-r74c-3w28 - Exploit, Third Party Advisory, Mitigation
CPE cpe:2.3:a:free5gc:free5gc:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Free5gc free5gc
Free5gc

16 Apr 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-16 22:16

Updated : 2026-04-21 13:53


NVD link : CVE-2026-40247

Mitre link : CVE-2026-40247

CVE.ORG link : CVE-2026-40247


JSON object : View

Products Affected

free5gc

  • free5gc
CWE
CWE-285

Improper Authorization

CWE-636

Not Failing Securely ('Failing Open')