CVE-2026-28517
Published: 27 February 2026
Summary
CVE-2026-28517 is a critical-severity OS Command Injection (CWE-78) vulnerability in Opendcim Opendcim. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 3.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validation and sanitization of the database-retrieved 'fac_Config.dot' parameter before passing it to exec(), directly preventing OS command injection.
Mandates timely remediation of the known command injection flaw in report_network_map.php, such as applying the referenced pull request fix.
Enforces secure configuration settings for the application, restricting the 'dot' parameter to safe, approved values consistent with operational requirements.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an unauthenticated OS command injection in a public-facing web application (openDCIM), directly enabling T1190 (Exploit Public-Facing Application) for remote code execution. It facilitates arbitrary shell command execution via PHP exec(), mapping to T1059.004 (Unix Shell).
NVD Description
openDCIM version 23.04, through commit 4467e9c4, contains an OS command injection vulnerability in report_network_map.php. The application retrieves the 'dot' configuration parameter from the database and passes it directly to exec() without validation or sanitization. If an attacker can modify the…
more
fac_Config.dot value, arbitrary commands may be executed in the context of the web server process.
Deeper analysisAI
CVE-2026-28517 is an OS command injection vulnerability (CWE-78) in openDCIM version 23.04 through commit 4467e9c4. The issue occurs in the report_network_map.php component, where the application retrieves the 'dot' configuration parameter from the fac_Config.dot value in the database and passes it directly to the exec() function without validation or sanitization.
An attacker who can modify the fac_Config.dot database value can execute arbitrary OS commands in the context of the web server process. The CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reflects its high severity, allowing remote exploitation over the network with low complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability.
References include a pull request at https://github.com/opendcim/openDCIM/pull/1664 addressing the issue, vulnerable code lines at https://github.com/opendcim/openDCIM/blob/4467e9c4/report_network_map.php#L467 and https://github.com/opendcim/openDCIM/blob/4467e9c4/report_network_map.php#L7, an exploit repository at https://github.com/Chocapikk/opendcim-exploit, and analysis at https://chocapikk.com/posts/2026/opendcim-sqli-to-rce/.
Details
- CWE(s)