Cyber Posture

CVE-2026-28516

HighPublic PoC

Published: 27 February 2026

Published
27 February 2026
Modified
10 March 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.2384 96.0th percentile
Risk Priority 32 60% EPSS · 20% KEV · 20% CVSS

Description

openDCIM version 23.04, through commit 4467e9c4, contains a SQL injection vulnerability in Config::UpdateParameter. The install.php and container-install.php handlers pass user-supplied input directly into SQL statements using string interpolation without prepared statements or proper input sanitation. An authenticated user can execute…

more

arbitrary SQL statements against the underlying database.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of user-supplied inputs before interpolation into SQL statements, preventing SQL injection in Config::UpdateParameter.

prevent

Mandates timely remediation of identified flaws, such as applying the patch from openDCIM pull request #1664 to fix the SQL injection vulnerability.

prevent

Enforces boundary protection with inspection to detect and block SQL injection payloads in remote authenticated requests to vulnerable handlers.

Security SummaryAI

CVE-2026-28516 is a SQL injection vulnerability (CWE-89) in openDCIM version 23.04 through commit 4467e9c4. The issue affects the Config::UpdateParameter function, specifically in the install.php and container-install.php handlers, which pass user-supplied input directly into SQL statements using string interpolation without prepared statements or proper input sanitization. This allows arbitrary SQL execution against the underlying database.

An authenticated user with low privileges (PR:L) can exploit the vulnerability remotely (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N), achieving high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). The CVSS 3.1 base score is 8.8 (S:U). Exploitation enables arbitrary SQL statements, with public resources demonstrating potential escalation to remote code execution.

Advisories and references point to mitigation via the patch in openDCIM pull request #1664 on GitHub. Additional resources include a detailed analysis of the SQLi-to-RCE chain and a public exploit repository. Affected code is visible in config.inc.php (lines 75-90) and install.php (lines 420-434).

Details

CWE(s)

Affected Products

opendcim
opendcim
23.04

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in web application enables exploitation of public-facing application (T1190) and arbitrary database access for collection (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References