Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/free5gc/udm
  4. ›
  5. CVE-2026-33065

CVE-2026-33065: free5GC UDM incorrectly returns 500 for empty supi path parameter in DELETE sdm-subscriptions request

March 18, 2026 (updated March 20, 2026)

Impact This is an Improper Error Handling vulnerability with Information Exposure implications.

  • Security Impact: The UDM incorrectly converts a downstream 400 Bad Request (from UDR) into a 500 Internal Server Error when handling DELETE requests with an empty supi path parameter. This leaks internal error handling behavior and makes it difficult for clients to distinguish between client-side errors and server-side failures.
  • Functional Impact: When a client sends a DELETE request with an empty supi (e.g., double slashes // in URL path), the UDM forwards the malformed request to UDR, which correctly returns 400. However, UDM propagates this as 500 SYSTEM_FAILURE instead of returning the appropriate 400 error to the client. This violates REST API best practices for DELETE operations.
  • Affected Parties: All deployments of free5GC v4.0.1 using the UDM Nudm_SDM service with DELETE operations on sdm-subscriptions endpoint.

Patches Yes, the issue has been patched. The fix is implemented in PR free5gc/udm#79. Users should upgrade to the next release of free5GC that includes this commit.

Workarounds There is no direct workaround at the application level. The recommendation is to apply the provided patch or implement API gateway-level validation to reject DELETE requests with empty path parameters before they reach UDM.

References

  • github.com/advisories/GHSA-958m-gxmc-mccm
  • github.com/free5gc/free5gc
  • github.com/free5gc/free5gc/issues/783
  • github.com/free5gc/free5gc/security/advisories/GHSA-958m-gxmc-mccm
  • github.com/free5gc/udm/commit/88de9fa74a1b3f3522e53b4cfa2d184712ffa4ee
  • github.com/free5gc/udm/pull/79
  • nvd.nist.gov/vuln/detail/CVE-2026-33065

Code Behaviors & Features

Detect and mitigate CVE-2026-33065 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.4.2

Fixed versions

  • 1.4.2

Solution

Upgrade to version 1.4.2 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-209: Generation of Error Message Containing Sensitive Information

Source file

go/github.com/free5gc/udm/CVE-2026-33065.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:19:23 +0000.