free5GC is an open-source project for 5th generation (5G) mobile core networks. Versions up to and including 1.4.1 of the User Data Repository are affected by Improper Error Handling with Information Exposure. The NEF component reliably leaks internal parsing error details (e.g., invalid character 'n' after top-level value) to remote clients, which can aid attackers in service fingerprinting. All deployments of free5GC using the Nnef_PfdManagement service may be vulnerable. free5gc/udr pull request 56 contains a patch. No direct workaround is available at the application level. Applying the official patch is recommended.
References
| Link | Resource |
|---|---|
| https://github.com/free5gc/free5gc/issues/753 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/free5gc/free5gc/security/advisories/GHSA-cj2h-x8qm-xgwc | Vendor Advisory |
| https://github.com/free5gc/udr/commit/754d23b03755ad59077ed529ce3b971e477080c4 | Patch |
| https://github.com/free5gc/udr/pull/56 | Issue Tracking Vendor Advisory Patch |
Configurations
History
No history.
Information
Published : 2026-02-24 01:16
Updated : 2026-02-25 16:39
NVD link : CVE-2025-69253
Mitre link : CVE-2025-69253
CVE.ORG link : CVE-2025-69253
JSON object : View
Products Affected
free5gc
- udr
CWE
CWE-209
Generation of Error Message Containing Sensitive Information
