SQL Injection Vulnerability in openDCIM Affected by Improper Input Sanitization
CVE-2026-28516

9.3CRITICAL

Key Information:

Vendor

Opendcim

Status
Vendor
CVE Published:
27 February 2026

Badges

๐Ÿ‘พ Exploit Exists

What is CVE-2026-28516?

The openDCIM software version 23.04 is susceptible to a SQL injection vulnerability resulting from improper handling of user input in the Config::UpdateParameter function. Specifically, the handlers install.php and container-install.php directly incorporate user-supplied data into SQL statements without implementing prepared statements or suitable input sanitation. This flaw enables authenticated users to run arbitrary SQL commands against the underlying database, potentially compromising sensitive information and system integrity.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

openDCIM 0 <= 23.04

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Valentin Lobstein (Chocapikk)
.