CVE-2026-28517 PUBLISHED

openDCIM <= 23.04 OS Command Injection via dot Configuration Parameter

Assigner: VulnCheck
Reserved: 27.02.2026 Published: 27.02.2026 Updated: 27.02.2026

openDCIM version 23.04, through commit 4467e9c4, contains an OS command injection vulnerability in report_network_map.php. The application retrieves the 'dot' configuration parameter from the database and passes it directly to exec() without validation or sanitation. If an attacker can modify the fac_Config.dot value, arbitrary commands may be executed in the context of the web server process.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor openDCIM
Product openDCIM
Versions Default: unknown
  • affected from 0 to 23.04 (incl.)

Credits

  • Valentin Lobstein (Chocapikk) finder

References

Problem Types

  • CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE