Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gx38-8h33-pmxr | free5gc UDR fail-open request handling in PolicyDataSubsToNotifySubsIdPut may allow unintended subscription updates after input errors |
Tue, 21 Apr 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:free5gc:free5gc:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Sat, 18 Apr 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Free5gc
Free5gc free5gc |
|
| Vendors & Products |
Free5gc
Free5gc free5gc |
Thu, 16 Apr 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | free5GC is an open-source implementation of the 5G core network. In versions 4.2.1 and below of the UDR service, the PUT handler for updating Policy Data notification subscriptions at /nudr-dr/v2/policy-data/subs-to-notify/{subsId} does not return after request body retrieval or deserialization errors. Although HTTP 500 or 400 error responses are sent, execution continues and the processor is invoked with a potentially uninitialized or partially initialized PolicyDataSubscription object. This fail-open behavior may allow unintended modification of existing Policy Data notification subscriptions with invalid or empty input, depending on downstream processor and storage behavior. A patched version was not available at the time of publication. | |
| Title | free5gc UDR fail-open request handling in PolicyDataSubsToNotifySubsIdPut may allow unintended subscription updates after input errors | |
| Weaknesses | CWE-636 CWE-754 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-18T02:47:28.094Z
Reserved: 2026-04-10T17:31:45.786Z
Link: CVE-2026-40249
Updated: 2026-04-18T02:47:24.325Z
Status : Analyzed
Published: 2026-04-16T22:16:38.793
Modified: 2026-04-21T13:51:02.590
Link: CVE-2026-40249
No data.
OpenCVE Enrichment
Updated: 2026-04-17T02:30:07Z
Github GHSA