{"api_version":"1","generated_at":"2026-04-28T23:27:09+00:00","cve":"CVE-2021-28122","urls":{"html":"https://cve.report/CVE-2021-28122","api":"https://cve.report/api/cve/CVE-2021-28122.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-28122","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-28122"},"summary":{"title":"CVE-2021-28122","description":"A request-validation issue was discovered in Open5GS 2.1.3 through 2.2.x before 2.2.1. The WebUI component allows an unauthenticated user to use a crafted HTTP API request to create, read, update, or delete entries in the subscriber database. For example, new administrative users can be added. The issue occurs because Express is not set up to require authentication.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2021-03-10 15:15:00","updated_at":"2022-07-12 17:42:00"},"problem_types":["CWE-306"],"metrics":[],"references":[{"url":"https://github.com/open5gs/open5gs/issues/837","name":"https://github.com/open5gs/open5gs/issues/837","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"Authentication Bypass in Webui · Issue #837 · open5gs/open5gs · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/open5gs/open5gs/pull/838","name":"https://github.com/open5gs/open5gs/pull/838","refsource":"MISC","tags":["Patch","Third Party Advisory"],"title":"Add API tokens by rashley-iqt · Pull Request #838 · open5gs/open5gs · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/open5gs/open5gs/releases","name":"https://github.com/open5gs/open5gs/releases","refsource":"MISC","tags":["Release Notes","Third Party Advisory"],"title":"Releases · open5gs/open5gs · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/open5gs/open5gs/compare/v2.2.0...v2.2.1","name":"https://github.com/open5gs/open5gs/compare/v2.2.0...v2.2.1","refsource":"CONFIRM","tags":[],"title":"Comparing v2.2.0...v2.2.1 · open5gs/open5gs · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-28122","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28122","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"28122","vulnerable":"1","versionEndIncluding":"2.2.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"open5gs","cpe5":"open5gs","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2021-28122","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A request-validation issue was discovered in Open5GS 2.1.3 through 2.2.x before 2.2.1. The WebUI component allows an unauthenticated user to use a crafted HTTP API request to create, read, update, or delete entries in the subscriber database. For example, new administrative users can be added. The issue occurs because Express is not set up to require authentication."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://github.com/open5gs/open5gs/releases","refsource":"MISC","name":"https://github.com/open5gs/open5gs/releases"},{"refsource":"MISC","name":"https://github.com/open5gs/open5gs/issues/837","url":"https://github.com/open5gs/open5gs/issues/837"},{"refsource":"MISC","name":"https://github.com/open5gs/open5gs/pull/838","url":"https://github.com/open5gs/open5gs/pull/838"},{"refsource":"CONFIRM","name":"https://github.com/open5gs/open5gs/compare/v2.2.0...v2.2.1","url":"https://github.com/open5gs/open5gs/compare/v2.2.0...v2.2.1"}]}},"nvd":{"publishedDate":"2021-03-10 15:15:00","lastModifiedDate":"2022-07-12 17:42:00","problem_types":["CWE-306"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*","versionStartIncluding":"2.1.3","versionEndIncluding":"2.2.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"28122","Ordinal":"203267","Title":"CVE-2021-28122","CVE":"CVE-2021-28122","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"28122","Ordinal":"1","NoteData":"A request-validation issue was discovered in Open5GS 2.1.3 through 2.2.x before 2.2.1. The WebUI component allows an unauthenticated user to use a crafted HTTP API request to create, read, update, or delete entries in the subscriber database. For example, new administrative users can be added. The issue occurs because Express is not set up to require authentication.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"28122","Ordinal":"2","NoteData":"2021-03-10","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"28122","Ordinal":"3","NoteData":"2021-03-19","Type":"Other","Title":"Modified"}]}}}