CVE-2026-28516
Published: 27 February 2026
Summary
CVE-2026-28516 is a high-severity SQL Injection (CWE-89) vulnerability in Opendcim Opendcim. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 3.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of user-supplied inputs before interpolation into SQL statements, preventing SQL injection in Config::UpdateParameter.
Mandates timely remediation of identified flaws, such as applying the patch from openDCIM pull request #1664 to fix the SQL injection vulnerability.
Enforces boundary protection with inspection to detect and block SQL injection payloads in remote authenticated requests to vulnerable handlers.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in web application enables exploitation of public-facing application (T1190) and arbitrary database access for collection (T1213.006).
NVD Description
openDCIM version 23.04, through commit 4467e9c4, contains a SQL injection vulnerability in Config::UpdateParameter. The install.php and container-install.php handlers pass user-supplied input directly into SQL statements using string interpolation without prepared statements or proper input sanitation. An authenticated user can execute…
more
arbitrary SQL statements against the underlying database.
Deeper analysisAI
CVE-2026-28516 is a SQL injection vulnerability (CWE-89) in openDCIM version 23.04 through commit 4467e9c4. The issue affects the Config::UpdateParameter function, specifically in the install.php and container-install.php handlers, which pass user-supplied input directly into SQL statements using string interpolation without prepared statements or proper input sanitization. This allows arbitrary SQL execution against the underlying database.
An authenticated user with low privileges (PR:L) can exploit the vulnerability remotely (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N), achieving high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). The CVSS 3.1 base score is 8.8 (S:U). Exploitation enables arbitrary SQL statements, with public resources demonstrating potential escalation to remote code execution.
Advisories and references point to mitigation via the patch in openDCIM pull request #1664 on GitHub. Additional resources include a detailed analysis of the SQLi-to-RCE chain and a public exploit repository. Affected code is visible in config.inc.php (lines 75-90) and install.php (lines 420-434).
Details
- CWE(s)