openDCIM version 23.04, through commit 4467e9c4, contains a SQL injection vulnerability in Config::UpdateParameter. The install.php and container-install.php handlers pass user-supplied input directly into SQL statements using string interpolation without prepared statements or proper input sanitation. An authenticated user can execute arbitrary SQL statements against the underlying database.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Feb 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | openDCIM version 23.04, through commit 4467e9c4, contains a SQL injection vulnerability in Config::UpdateParameter. The install.php and container-install.php handlers pass user-supplied input directly into SQL statements using string interpolation without prepared statements or proper input sanitation. An authenticated user can execute arbitrary SQL statements against the underlying database. | |
| Title | openDCIM <= 23.04 SQL Injection in Config::UpdateParameter | |
| Weaknesses | CWE-89 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-27T22:11:52.246Z
Reserved: 2026-02-27T21:07:55.466Z
Link: CVE-2026-28516
No data.
Status : Received
Published: 2026-02-27T23:16:06.180
Modified: 2026-02-27T23:16:06.180
Link: CVE-2026-28516
No data.
OpenCVE Enrichment
No data.