Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/free5gc/udr
  4. ›
  5. CVE-2026-40248

CVE-2026-40248: free5gc UDR improper path validation allows unauthenticated creation and modification of Traffic Influence Subscriptions

April 14, 2026 (updated April 24, 2026)

An improper path validation vulnerability in the UDR service allows any unauthenticated attacker with access to the 5G Service Based Interface (SBI) to create or overwrite Traffic Influence Subscriptions by supplying an arbitrary value in place of the expected subs-to-notify path segment.

References

  • github.com/advisories/GHSA-jgq2-qv8v-5cmj
  • github.com/free5gc/free5gc/security/advisories/GHSA-jgq2-qv8v-5cmj
  • github.com/free5gc/udr
  • nvd.nist.gov/vuln/detail/CVE-2026-40248

Code Behaviors & Features

Detect and mitigate CVE-2026-40248 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 1.4.2

Solution

Unfortunately, there is no solution available yet.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-285: Improper Authorization
  • CWE-636: Not Failing Securely ('Failing Open')

Source file

go/github.com/free5gc/udr/CVE-2026-40248.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:17 +0000.