OS Command Injection Vulnerability in openDCIM by openDCIM
CVE-2026-28517
Key Information:
Badges
What is CVE-2026-28517?
The openDCIM application version 23.04 contains a security flaw in the report_network_map.php file, where the 'dot' configuration parameter is directly passed to the exec() function without adequate validation or sanitization. This can lead to arbitrary command execution in the context of the web server process if an attacker successfully alters the fac_Config.dot value in the database. The implications of this vulnerability allow for potential unauthorized actions to be executed, making it crucial for users to take immediate protective measures.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
openDCIM 0 <= 23.04
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
