openDCIM version 23.04, through commit 4467e9c4, contains an OS command injection vulnerability in report_network_map.php. The application retrieves the 'dot' configuration parameter from the database and passes it directly to exec() without validation or sanitation. If an attacker can modify the fac_Config.dot value, arbitrary commands may be executed in the context of the web server process.
History

Fri, 27 Feb 2026 22:30:00 +0000

Type Values Removed Values Added
Description openDCIM version 23.04, through commit 4467e9c4, contains an OS command injection vulnerability in report_network_map.php. The application retrieves the 'dot' configuration parameter from the database and passes it directly to exec() without validation or sanitation. If an attacker can modify the fac_Config.dot value, arbitrary commands may be executed in the context of the web server process.
Title openDCIM <= 23.04 OS Command Injection via dot Configuration Parameter
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-02-27T22:12:08.889Z

Reserved: 2026-02-27T21:07:55.466Z

Link: CVE-2026-28517

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-27T23:16:06.357

Modified: 2026-02-27T23:16:06.357

Link: CVE-2026-28517

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.