Cyber Posture

CVE-2026-28517

CriticalPublic PoC

Published: 27 February 2026

Published
27 February 2026
Modified
10 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.3137 96.8th percentile
Risk Priority 38 60% EPSS · 20% KEV · 20% CVSS

Description

openDCIM version 23.04, through commit 4467e9c4, contains an OS command injection vulnerability in report_network_map.php. The application retrieves the 'dot' configuration parameter from the database and passes it directly to exec() without validation or sanitation. If an attacker can modify the…

more

fac_Config.dot value, arbitrary commands may be executed in the context of the web server process.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation and sanitization of the database-retrieved 'fac_Config.dot' parameter before passing it to exec(), directly preventing OS command injection.

prevent

Mandates timely remediation of the known command injection flaw in report_network_map.php, such as applying the referenced pull request fix.

prevent

Enforces secure configuration settings for the application, restricting the 'dot' parameter to safe, approved values consistent with operational requirements.

Security SummaryAI

CVE-2026-28517 is an OS command injection vulnerability (CWE-78) in openDCIM version 23.04 through commit 4467e9c4. The issue occurs in the report_network_map.php component, where the application retrieves the 'dot' configuration parameter from the fac_Config.dot value in the database and passes it directly to the exec() function without validation or sanitization.

An attacker who can modify the fac_Config.dot database value can execute arbitrary OS commands in the context of the web server process. The CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reflects its high severity, allowing remote exploitation over the network with low complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability.

References include a pull request at https://github.com/opendcim/openDCIM/pull/1664 addressing the issue, vulnerable code lines at https://github.com/opendcim/openDCIM/blob/4467e9c4/report_network_map.php#L467 and https://github.com/opendcim/openDCIM/blob/4467e9c4/report_network_map.php#L7, an exploit repository at https://github.com/Chocapikk/opendcim-exploit, and analysis at https://chocapikk.com/posts/2026/opendcim-sqli-to-rce/.

Details

CWE(s)

Affected Products

opendcim
opendcim
23.04

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

The vulnerability is an unauthenticated OS command injection in a public-facing web application (openDCIM), directly enabling T1190 (Exploit Public-Facing Application) for remote code execution. It facilitates arbitrary shell command execution via PHP exec(), mapping to T1059.004 (Unix Shell).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References