Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.6
free5GC User Data Repository Leaks Error Details to Attackers
CVE-2025-69253
Summary
Versions of free5GC's User Data Repository up to 1.4.1 may allow attackers to gather information about your network's internal workings. This could help them launch more targeted attacks. To fix this, update to a version that has already been patched, such as the one found in pull request 56.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| free5gc | udr | <= 1.4.1 | – |
Original title
free5GC is an open-source project for 5th generation (5G) mobile core networks. Versions up to and including 1.4.1 of the User Data Repository are affected by Improper Error Handling with Informati...
Original description
free5GC is an open-source project for 5th generation (5G) mobile core networks. Versions up to and including 1.4.1 of the User Data Repository are affected by Improper Error Handling with Information Exposure. The NEF component reliably leaks internal parsing error details (e.g., invalid character 'n' after top-level value) to remote clients, which can aid attackers in service fingerprinting. All deployments of free5GC using the Nnef_PfdManagement service may be vulnerable. free5gc/udr pull request 56 contains a patch. No direct workaround is available at the application level. Applying the official patch is recommended.
nvd CVSS3.1
5.3
nvd CVSS4.0
6.6
Vulnerability type
CWE-209
- https://github.com/free5gc/free5gc/issues/753 Exploit Issue Tracking Vendor Advisory
- https://github.com/free5gc/free5gc/security/advisories/GHSA-cj2h-x8qm-xgwc Vendor Advisory
- https://github.com/free5gc/udr/commit/754d23b03755ad59077ed529ce3b971e477080c4 Patch
- https://github.com/free5gc/udr/pull/56 Issue Tracking Vendor Advisory Patch
Published: 24 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026