Impact
The vulnerability occurs when Free5GC’s Unified Data Management (UDM) component receives a DELETE request that contains an empty subscriber profile identifier (supi) in the URL path. Instead of propagating the downstream 400 Bad Request returned by the User Data Repository (UDR) back to the client, the UDM mistakenly converts it into a 500 Internal Server Error. This misreporting violates REST API best practices and leaks internal error handling behavior, making it difficult for clients to distinguish between client‑side mistakes and genuine server failures. The flaw does not provide an attacker with direct code execution or data exfiltration capabilities; it primarily affects HTTP status code accuracy and diagnostic clarity.
Affected Systems
Free5GC’s Unified Data Management service, version numbers prior to 1.4.2, is affected. The fix was applied in version 1.4.2 and later releases. Users running any earlier release of the UDM component should upgrade to a version that includes the patch.
Risk and Exploitability
With a CVSS score of 6.9 the vulnerability is considered moderate. The EPSS score is less than 1%, and it is not listed in the CISA KEV catalog, indicating low exploitation probability. An attacker can trigger the defect by sending a crafted DELETE request with an empty supi, but the impact is limited to misrepresented error codes and potential information disclosure through internal server messages. There are no known public exploits or remote code execution vectors associated with this issue.
OpenCVE Enrichment
Github GHSA