CVE-2026-28516
Published: 27 February 2026
Description
openDCIM version 23.04, through commit 4467e9c4, contains a SQL injection vulnerability in Config::UpdateParameter. The install.php and container-install.php handlers pass user-supplied input directly into SQL statements using string interpolation without prepared statements or proper input sanitation. An authenticated user can execute…
more
arbitrary SQL statements against the underlying database.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of user-supplied inputs before interpolation into SQL statements, preventing SQL injection in Config::UpdateParameter.
Mandates timely remediation of identified flaws, such as applying the patch from openDCIM pull request #1664 to fix the SQL injection vulnerability.
Enforces boundary protection with inspection to detect and block SQL injection payloads in remote authenticated requests to vulnerable handlers.
Security SummaryAI
CVE-2026-28516 is a SQL injection vulnerability (CWE-89) in openDCIM version 23.04 through commit 4467e9c4. The issue affects the Config::UpdateParameter function, specifically in the install.php and container-install.php handlers, which pass user-supplied input directly into SQL statements using string interpolation without prepared statements or proper input sanitization. This allows arbitrary SQL execution against the underlying database.
An authenticated user with low privileges (PR:L) can exploit the vulnerability remotely (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N), achieving high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). The CVSS 3.1 base score is 8.8 (S:U). Exploitation enables arbitrary SQL statements, with public resources demonstrating potential escalation to remote code execution.
Advisories and references point to mitigation via the patch in openDCIM pull request #1664 on GitHub. Additional resources include a detailed analysis of the SQLi-to-RCE chain and a public exploit repository. Affected code is visible in config.inc.php (lines 75-90) and install.php (lines 420-434).
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in web application enables exploitation of public-facing application (T1190) and arbitrary database access for collection (T1213.006).