The vulnerability CVE-2026-33065 describes an improper error handling issue in the free5GC UDM service. Specifically, when a DELETE request is sent to the sdm-subscriptions endpoint with an empty supi path parameter, the service returns a 500 Internal Server Error instead of the correct 400 Bad Request. This leaks information about the internal workings of the service.
The analysis of the provided patch commit 88de9fa74a1b3f3522e53b4cfa2d184712ffa4ee reveals changes in the file internal/sbi/api_subscriberdatamanagement.go. The commit adds input validation to several HTTP handler functions.
The primary vulnerable function is Server.HandleUnsubscribe, which is the handler for the DELETE /sdm-subscriptions/:ueId/:subscriptionId route. The patch explicitly adds a validation block to check if the ueId parameter is a valid SUPI or GPSI. Before this change, an empty ueId would be passed down to the business logic (UnsubscribeProcedure), triggering the incorrect error propagation.
Additionally, the same patch applies similar validation fixes to other handler functions (HandleGetAmData, HandleModify, HandleGetIdTranslationResult) within the same file. Although the CVE description focuses on the DELETE request, these functions were also missing crucial input validation for user-provided identifiers (supi, ueId), making them susceptible to similar improper error handling vulnerabilities. Therefore, they are included as vulnerable functions that are fixed by the same patch.