CVE-2026-28517
openDCIM version 23.04, through commit 4467e9c4, contains an OS command injection vulnerability in reportnetworkmap.php. The application retrieves the 'dot' configuration parameter from the database and passes it directly to exec() without validation or sanitation. If an attacker can modify the fac_Config.dot value, arbitrary commands may be executed in the context of the web server process.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/opendcim/openDCIM/blob/4467e9c4/reportnetworkmap.php#L467, https://github.com/opendcim/openDCIM/blob/4467e9c4/reportnetworkmap.php#L7, https://www.vulncheck.com/advisories/opendcim-os-command-injection-via-dot-configuration-parameter, https://github.com/opendcim/openDCIM/pull/1664, https://github.com/opendcim/openDCIM/pull/1664/changes/8f7ab2a710086a9c8c269560793e47c577ddda09, https://chocapikk.com/posts/2026/opendcim-sqli-to-rce/, https://github.com/Chocapikk/opendcim-exploit
