{"id":"CVE-2026-28516","details":"openDCIM version 23.04, through commit 4467e9c4, contains a SQL injection vulnerability in Config::UpdateParameter. The install.php and container-install.php handlers pass user-supplied input directly into SQL statements using string interpolation without prepared statements or proper input sanitation. An authenticated user can execute arbitrary SQL statements against the underlying database.","modified":"2026-04-02T13:23:06.799611Z","published":"2026-02-27T23:16:06.180Z","references":[{"type":"WEB","url":"https://github.com/opendcim/openDCIM/blob/4467e9c4/config.inc.php#L75-L90"},{"type":"WEB","url":"https://github.com/opendcim/openDCIM/blob/4467e9c4/install.php#L420-L434"},{"type":"ADVISORY","url":"https://www.vulncheck.com/advisories/opendcim-sql-injection-in-config-updateparameter"},{"type":"FIX","url":"https://github.com/opendcim/openDCIM/pull/1664"},{"type":"FIX","url":"https://github.com/opendcim/openDCIM/pull/1664/changes/8f7ab2a710086a9c8c269560793e47c577ddda09"},{"type":"EVIDENCE","url":"https://github.com/Chocapikk/opendcim-exploit"},{"type":"EVIDENCE","url":"https://chocapikk.com/posts/2026/opendcim-sqli-to-rce/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/opendcim/openDCIM","events":[{"introduced":"0"},{"last_affected":"5e24d4c5daff7f3db12a90594b9ad56e136fc374"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"23.04"}]}}],"versions":["1.3","18.01","18.02","19.01","2.0","2.0.1","2.0.2","2.1","2.1-RC0","20.01","20.02","21.01","23.01","23.02","23.03","23.04","3.0","3.1","3.2","3.2.1","3.3","4.0-beta.1","4.0-beta.2","4.0.1","4.1","4.1.1","4.2","4.2-Release","4.3","4.3.1","4.4","4.5","openDCIM-1.3","openDCIM-1.5","openDCIM-1.5.1","openDCIM-1.5.2","openDCIM-18.01","openDCIM-2.0-RC0","openDCIM-21.01","openDICM-1.4","v4.0","v4.0a"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-28516.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}