๐Ÿ” CVE Alert

CVE-2026-28517

UNKNOWN 0.0

openDCIM <= 23.04 OS Command Injection via dot Configuration Parameter

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

openDCIM version 23.04, through commit 4467e9c4, contains an OS command injection vulnerability in report_network_map.php. The application retrieves the 'dot' configuration parameter from the database and passes it directly to exec() without validation or sanitation. If an attacker can modify the fac_Config.dot value, arbitrary commands may be executed in the context of the web server process.

CWE CWE-78
Vendor opendcim
Product opendcim
Published Feb 27, 2026
Last Updated Mar 2, 2026
Stay Ahead of the Next One

Get instant alerts for opendcim opendcim

Be the first to know when new unknown vulnerabilities affecting opendcim opendcim are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

openDCIM / openDCIM
0 โ‰ค 23.04

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
chocapikk.com: https://chocapikk.com/posts/2026/opendcim-sqli-to-rce/ github.com: https://github.com/Chocapikk/opendcim-exploit github.com: https://github.com/opendcim/openDCIM/pull/1664 github.com: https://github.com/opendcim/openDCIM/pull/1664/changes/8f7ab2a710086a9c8c269560793e47c577ddda09 github.com: https://github.com/opendcim/openDCIM/blob/4467e9c4/report_network_map.php#L7 github.com: https://github.com/opendcim/openDCIM/blob/4467e9c4/report_network_map.php#L467 vulncheck.com: https://www.vulncheck.com/advisories/opendcim-os-command-injection-via-dot-configuration-parameter

Credits

Valentin Lobstein (Chocapikk)