openDCIM version 23.04, through commit 4467e9c4, contains a SQL injection vulnerability in Config::UpdateParameter. The install.php and container-install.php handlers pass user-supplied input directly into SQL statements using string interpolation without prepared statements or proper input sanitation. An authenticated user can execute arbitrary SQL statements against the underlying database.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 27 Feb 2026 22:30:00 +0000

Type Values Removed Values Added
Description openDCIM version 23.04, through commit 4467e9c4, contains a SQL injection vulnerability in Config::UpdateParameter. The install.php and container-install.php handlers pass user-supplied input directly into SQL statements using string interpolation without prepared statements or proper input sanitation. An authenticated user can execute arbitrary SQL statements against the underlying database.
Title openDCIM <= 23.04 SQL Injection in Config::UpdateParameter
Weaknesses CWE-89
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-02-27T22:11:52.246Z

Reserved: 2026-02-27T21:07:55.466Z

Link: CVE-2026-28516

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-27T23:16:06.180

Modified: 2026-02-27T23:16:06.180

Link: CVE-2026-28516

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses