Cyber Posture

CVE-2026-28516

HighPublic PoC

Published: 27 February 2026

Published
27 February 2026
Modified
10 March 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.2384 96.1th percentile
Risk Priority 32 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-28516 is a high-severity SQL Injection (CWE-89) vulnerability in Opendcim Opendcim. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 3.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of user-supplied inputs before interpolation into SQL statements, preventing SQL injection in Config::UpdateParameter.

prevent

Mandates timely remediation of identified flaws, such as applying the patch from openDCIM pull request #1664 to fix the SQL injection vulnerability.

prevent

Enforces boundary protection with inspection to detect and block SQL injection payloads in remote authenticated requests to vulnerable handlers.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in web application enables exploitation of public-facing application (T1190) and arbitrary database access for collection (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

openDCIM version 23.04, through commit 4467e9c4, contains a SQL injection vulnerability in Config::UpdateParameter. The install.php and container-install.php handlers pass user-supplied input directly into SQL statements using string interpolation without prepared statements or proper input sanitation. An authenticated user can execute…

more

arbitrary SQL statements against the underlying database.

Deeper analysisAI

CVE-2026-28516 is a SQL injection vulnerability (CWE-89) in openDCIM version 23.04 through commit 4467e9c4. The issue affects the Config::UpdateParameter function, specifically in the install.php and container-install.php handlers, which pass user-supplied input directly into SQL statements using string interpolation without prepared statements or proper input sanitization. This allows arbitrary SQL execution against the underlying database.

An authenticated user with low privileges (PR:L) can exploit the vulnerability remotely (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N), achieving high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). The CVSS 3.1 base score is 8.8 (S:U). Exploitation enables arbitrary SQL statements, with public resources demonstrating potential escalation to remote code execution.

Advisories and references point to mitigation via the patch in openDCIM pull request #1664 on GitHub. Additional resources include a detailed analysis of the SQLi-to-RCE chain and a public exploit repository. Affected code is visible in config.inc.php (lines 75-90) and install.php (lines 420-434).

Details

CWE(s)

Affected Products

opendcim
opendcim
23.04

CVEs Like This One

CVE-2026-28517Same product: Opendcim Opendcim
CVE-2026-28515Same product: Opendcim Opendcim
CVE-2025-40639Shared CWE-89
CVE-2019-25674Shared CWE-89
CVE-2019-25526Shared CWE-89
CVE-2019-25524Shared CWE-89
CVE-2025-23780Shared CWE-89
CVE-2026-40887Shared CWE-89
CVE-2024-51818Shared CWE-89
CVE-2026-31891Shared CWE-89

References