Home

Description

openDCIM version 23.04, through commit 4467e9c4, contains a SQL injection vulnerability in Config::UpdateParameter. The install.php and container-install.php handlers pass user-supplied input directly into SQL statements using string interpolation without prepared statements or proper input sanitation. An authenticated user can execute arbitrary SQL statements against the underlying database.

PUBLISHED Reserved 2026-02-27 | Published 2026-02-27 | Updated 2026-03-02 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

Default status
unknown

Any version
affected

Credits

Valentin Lobstein (Chocapikk) finder

References

chocapikk.com/posts/2026/opendcim-sqli-to-rce/ technical-description exploit

github.com/Chocapikk/opendcim-exploit exploit

github.com/opendcim/openDCIM/pull/1664 issue-tracking

github.com/...anges/8f7ab2a710086a9c8c269560793e47c577ddda09 patch

github.com/opendcim/openDCIM/blob/4467e9c4/install.php

github.com/opendcim/openDCIM/blob/4467e9c4/config.inc.php

www.vulncheck.com/...sql-injection-in-config-updateparameter third-party-advisory

cve.org (CVE-2026-28516)

nvd.nist.gov (CVE-2026-28516)

Download JSON