CVE-2026-28516

HIGH

CVSS v3

8.8

HIGH

EPSS Score

23.8%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

openDCIM version 23.04, through commit 4467e9c4, contains a SQL injection vulnerability in Config::UpdateParameter. The install.php and container-install.php handlers pass user-supplied input directly into SQL statements using string interpolation without prepared statements or proper input sanitation. An authenticated user can execute arbitrary SQL statements against the underlying database.

Technical Details

CVSS v3 Vector
3.1
Published
2/27/2026
Last Modified
3/10/2026

Frequently Asked Questions

What is CVE-2026-28516?

openDCIM version 23.04, through commit 4467e9c4, contains a SQL injection vulnerability in Config::UpdateParameter. The install.php and container-install.php handlers pass user-supplied input directly into SQL statements using string interpolation without prepared statements or proper input sanitation. An authenticated user can execute arbitrary SQL statements against the underlying database.

Is CVE-2026-28516 actively exploited?

Active exploitation of CVE-2026-28516 has not been confirmed. The EPSS score is 23.8%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2026-28516?

CVE-2026-28516 has a CVSS v3 base score of 8.8 (HIGH severity), with vector string 3.1.

Is CVE-2026-28516 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.