CVE-2026-28516
openDCIM version 23.04, through commit 4467e9c4, contains a SQL injection vulnerability in Config::UpdateParameter. The install.php and container-install.php handlers pass user-supplied input directly into SQL statements using string interpolation without prepared statements or proper input sanitation. An authenticated user can execute arbitrary SQL statements against the underlying database.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/opendcim/openDCIM/blob/4467e9c4/config.inc.php#L75-L90, https://github.com/opendcim/openDCIM/blob/4467e9c4/install.php#L420-L434, https://www.vulncheck.com/advisories/opendcim-sql-injection-in-config-updateparameter, https://github.com/opendcim/openDCIM/pull/1664, https://github.com/opendcim/openDCIM/pull/1664/changes/8f7ab2a710086a9c8c269560793e47c577ddda09, https://github.com/Chocapikk/opendcim-exploit, https://chocapikk.com/posts/2026/opendcim-sqli-to-rce/
