Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-28515

Summary
Assigner-VulnCheck
Assigner Org ID-83251b91-4cc7-4094-a5c7-464a1b83ea10
Published At-27 Feb, 2026 | 22:11
Updated At-27 Feb, 2026 | 22:11
Rejected At-
Credits

openDCIM <= 23.04 Missing Authorization in install.php

openDCIM version 23.04, through commit 4467e9c4, contains a missing authorization vulnerability in install.php and container-install.php. The installer and upgrade handler expose LDAP configuration functionality without enforcing application role checks. Any authenticated user can access this functionality regardless of assigned privileges. In deployments where REMOTE_USER is set without authentication enforcement, the endpoint may be accessible without credentials. This allows unauthorized modification of application configuration.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:VulnCheck
Assigner Org ID:83251b91-4cc7-4094-a5c7-464a1b83ea10
Published At:27 Feb, 2026 | 22:11
Updated At:27 Feb, 2026 | 22:11
Rejected At:
▼CVE Numbering Authority (CNA)
openDCIM <= 23.04 Missing Authorization in install.php

openDCIM version 23.04, through commit 4467e9c4, contains a missing authorization vulnerability in install.php and container-install.php. The installer and upgrade handler expose LDAP configuration functionality without enforcing application role checks. Any authenticated user can access this functionality regardless of assigned privileges. In deployments where REMOTE_USER is set without authentication enforcement, the endpoint may be accessible without credentials. This allows unauthorized modification of application configuration.

Affected Products
Vendor
openDCIM
Product
openDCIM
Repo
https://github.com/opendcim/openDCIM
Default Status
unknown
Versions
Affected
  • From 0 through 23.04 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-862CWE-862 Missing Authorization
Type: CWE
CWE ID: CWE-862
Description: CWE-862 Missing Authorization
Metrics
VersionBase scoreBase severityVector
4.09.3CRITICAL
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 9.3
Base severity: CRITICAL
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Valentin Lobstein (Chocapikk)
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://chocapikk.com/posts/2026/opendcim-sqli-to-rce/
technical-description
exploit
https://github.com/Chocapikk/opendcim-exploit
exploit
https://github.com/opendcim/openDCIM/pull/1664
issue-tracking
https://github.com/opendcim/openDCIM/pull/1664/changes/8f7ab2a710086a9c8c269560793e47c577ddda09
patch
https://github.com/opendcim/openDCIM/blob/4467e9c4/install.php#L293
N/A
https://github.com/opendcim/openDCIM/blob/4467e9c4/install.php#L420-L434
N/A
https://github.com/opendcim/openDCIM/blob/4467e9c4/container-install.php#L421-L435
N/A
https://www.vulncheck.com/advisories/opendcim-missing-authorization-in-install-php
third-party-advisory
Hyperlink: https://chocapikk.com/posts/2026/opendcim-sqli-to-rce/
Resource:
technical-description
exploit
Hyperlink: https://github.com/Chocapikk/opendcim-exploit
Resource:
exploit
Hyperlink: https://github.com/opendcim/openDCIM/pull/1664
Resource:
issue-tracking
Hyperlink: https://github.com/opendcim/openDCIM/pull/1664/changes/8f7ab2a710086a9c8c269560793e47c577ddda09
Resource:
patch
Hyperlink: https://github.com/opendcim/openDCIM/blob/4467e9c4/install.php#L293
Resource: N/A
Hyperlink: https://github.com/opendcim/openDCIM/blob/4467e9c4/install.php#L420-L434
Resource: N/A
Hyperlink: https://github.com/opendcim/openDCIM/blob/4467e9c4/container-install.php#L421-L435
Resource: N/A
Hyperlink: https://www.vulncheck.com/advisories/opendcim-missing-authorization-in-install-php
Resource:
third-party-advisory
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:disclosure@vulncheck.com
Published At:27 Feb, 2026 | 23:16
Updated At:27 Feb, 2026 | 23:16

openDCIM version 23.04, through commit 4467e9c4, contains a missing authorization vulnerability in install.php and container-install.php. The installer and upgrade handler expose LDAP configuration functionality without enforcing application role checks. Any authenticated user can access this functionality regardless of assigned privileges. In deployments where REMOTE_USER is set without authentication enforcement, the endpoint may be accessible without credentials. This allows unauthorized modification of application configuration.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.09.3CRITICAL
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 4.0
Base score: 9.3
Base severity: CRITICAL
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-862Primarydisclosure@vulncheck.com
CWE ID: CWE-862
Type: Primary
Source: disclosure@vulncheck.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://chocapikk.com/posts/2026/opendcim-sqli-to-rce/disclosure@vulncheck.com
N/A
https://github.com/Chocapikk/opendcim-exploitdisclosure@vulncheck.com
N/A
https://github.com/opendcim/openDCIM/blob/4467e9c4/container-install.php#L421-L435disclosure@vulncheck.com
N/A
https://github.com/opendcim/openDCIM/blob/4467e9c4/install.php#L293disclosure@vulncheck.com
N/A
https://github.com/opendcim/openDCIM/blob/4467e9c4/install.php#L420-L434disclosure@vulncheck.com
N/A
https://github.com/opendcim/openDCIM/pull/1664disclosure@vulncheck.com
N/A
https://github.com/opendcim/openDCIM/pull/1664/changes/8f7ab2a710086a9c8c269560793e47c577ddda09disclosure@vulncheck.com
N/A
https://www.vulncheck.com/advisories/opendcim-missing-authorization-in-install-phpdisclosure@vulncheck.com
N/A
Hyperlink: https://chocapikk.com/posts/2026/opendcim-sqli-to-rce/
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://github.com/Chocapikk/opendcim-exploit
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://github.com/opendcim/openDCIM/blob/4467e9c4/container-install.php#L421-L435
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://github.com/opendcim/openDCIM/blob/4467e9c4/install.php#L293
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://github.com/opendcim/openDCIM/blob/4467e9c4/install.php#L420-L434
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://github.com/opendcim/openDCIM/pull/1664
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://github.com/opendcim/openDCIM/pull/1664/changes/8f7ab2a710086a9c8c269560793e47c577ddda09
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://www.vulncheck.com/advisories/opendcim-missing-authorization-in-install-php
Source: disclosure@vulncheck.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

9Records found

CVE-2026-28516
Matching Score-8
Assigner-VulnCheck
ShareView Details
Matching Score-8
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-Not Assigned
Published-27 Feb, 2026 | 22:11
Updated-27 Feb, 2026 | 23:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
openDCIM <= 23.04 SQL Injection in Config::UpdateParameter

openDCIM version 23.04, through commit 4467e9c4, contains a SQL injection vulnerability in Config::UpdateParameter. The install.php and container-install.php handlers pass user-supplied input directly into SQL statements using string interpolation without prepared statements or proper input sanitation. An authenticated user can execute arbitrary SQL statements against the underlying database.

Action-Not Available
Vendor-openDCIM
Product-openDCIM
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2026-28517
Matching Score-8
Assigner-VulnCheck
ShareView Details
Matching Score-8
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-Not Assigned
Published-27 Feb, 2026 | 22:12
Updated-27 Feb, 2026 | 23:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
openDCIM <= 23.04 OS Command Injection via dot Configuration Parameter

openDCIM version 23.04, through commit 4467e9c4, contains an OS command injection vulnerability in report_network_map.php. The application retrieves the 'dot' configuration parameter from the database and passes it directly to exec() without validation or sanitation. If an attacker can modify the fac_Config.dot value, arbitrary commands may be executed in the context of the web server process.

Action-Not Available
Vendor-openDCIM
Product-openDCIM
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-10352
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-9.3||CRITICAL
EPSS-0.17% / 38.11%
||
7 Day CHG~0.00%
Published-08 Oct, 2025 | 10:46
Updated-22 Dec, 2025 | 18:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization vulnerability in Melis Platform

Vulnerability in the melis-core module of Melis Technology's Melis Platform, which, if exploited, allows an unauthenticated attacker to create an administrator account via a request to '/melis/MelisCore/ToolUser/addNewUser'.

Action-Not Available
Vendor-Melis Technology
Product-Melis Platform
CWE ID-CWE-862
Missing Authorization
CVE-2025-54943
Matching Score-4
Assigner-ZUSO Advanced Research Team (ZUSO ART)
ShareView Details
Matching Score-4
Assigner-ZUSO Advanced Research Team (ZUSO ART)
CVSS Score-9.3||CRITICAL
EPSS-0.18% / 39.43%
||
7 Day CHG~0.00%
Published-30 Aug, 2025 | 03:42
Updated-30 Jan, 2026 | 04:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SUNNET Corporate Training Management System - Missing Authorization

A missing authorization vulnerability in SUNNET Corporate Training Management System before 10.11 allows remote attackers to perform unauthorized application deployment due to the absence of proper access control checks.

Action-Not Available
Vendor-sun.netSUNNET Technology Co., Ltd.
Product-ehrd_ctmsCorporate Training Management System
CWE ID-CWE-862
Missing Authorization
CVE-2025-46811
Matching Score-4
Assigner-SUSE
ShareView Details
Matching Score-4
Assigner-SUSE
CVSS Score-9.3||CRITICAL
EPSS-0.07% / 20.65%
||
7 Day CHG+0.01%
Published-30 Jul, 2025 | 14:20
Updated-26 Feb, 2026 | 17:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SUSE Multi Linux Manager allows code execution via unprotected websocket endpoint

A Missing Authorization vulnerability in SUSE Linux Manager allows anyone with the ability to connect to port 443 of SUSE Manager is able to run any command as root on any client. This issue affects Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1: from ? before 5.0.27-150600.3.33.1; Image SLES15-SP4-Manager-Server-4-3-BYOS: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE: from ? before 4.3.87-150400.3.110.2; SUSE Manager Server Module 4.3: from ? before 4.3.87-150400.3.110.2.

Action-Not Available
Vendor-SUSE
Product-Image SLES15-SP4-Manager-Server-4-3-BYOSContainer suse/manager/5.0/x86_64/server:5.0.5.7.30.1SUSE Manager Server Module 4.3Image SLES15-SP4-Manager-Server-4-3-BYOS-AzureImage SLES15-SP4-Manager-Server-4-3-BYOS-GCEImage SLES15-SP4-Manager-Server-4-3-BYOS-EC2
CWE ID-CWE-862
Missing Authorization
CVE-2020-36902
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.57% / 68.17%
||
7 Day CHG~0.00%
Published-10 Dec, 2025 | 21:05
Updated-30 Dec, 2025 | 20:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
UBICOD Medivision Digital Signage 1.5.1 Authorization Bypass via User Privileges

UBICOD Medivision Digital Signage 1.5.1 contains an authorization bypass vulnerability that allows normal users to escalate privileges by manipulating the 'ft[grp]' parameter. Attackers can send a GET request to /html/user with 'ft[grp]' set to integer value '3' to gain super admin rights without authentication.

Action-Not Available
Vendor-medivisionUBICOD Co., Ltd. | MEDIVISION INC.
Product-medivision_digital_signage_firmwaremedivision_digital_signageUBICOD Medivision Digital Signage
CWE ID-CWE-862
Missing Authorization
CVE-2023-53923
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.17% / 38.47%
||
7 Day CHG+0.01%
Published-17 Dec, 2025 | 22:44
Updated-18 Dec, 2025 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
UliCMS 2023.1 Privilege Escalation via Unauthenticated Admin Account Creation

UliCMS 2023.1 contains a privilege escalation vulnerability that allows unauthenticated attackers to create administrative accounts through the UserController endpoint. Attackers can send a crafted POST request to /dist/admin/index.php with specific parameters to generate a new admin user with full system access.

Action-Not Available
Vendor-ulicmsUlicms
Product-ulicmsUlicms
CWE ID-CWE-862
Missing Authorization
CVE-2023-54327
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-1.61% / 81.48%
||
7 Day CHG~0.00%
Published-30 Dec, 2025 | 22:41
Updated-16 Jan, 2026 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tinycontrol LAN Controller 1.58a Authentication Bypass via Admin Password Change

Tinycontrol LAN Controller 1.58a contains an authentication bypass vulnerability that allows unauthenticated attackers to change admin passwords through a crafted API request. Attackers can exploit the /stm.cgi endpoint with a specially crafted authentication parameter to disable access controls and modify administrative credentials.

Action-Not Available
Vendor-tinycontrolTinycontrol
Product-lan_controller_firmwarelan_controllerLAN Controller
CWE ID-CWE-862
Missing Authorization
CVE-2021-47812
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.16% / 37.07%
||
7 Day CHG+0.04%
Published-15 Jan, 2026 | 23:25
Updated-02 Feb, 2026 | 16:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GravCMS 1.10.7 - Arbitrary YAML Write/Update (Unauthenticated) (2)

GravCMS 1.10.7 contains an unauthenticated vulnerability that allows remote attackers to write arbitrary YAML configuration and execute PHP code through the scheduler endpoint. Attackers can exploit the admin-nonce parameter to inject base64-encoded payloads and create malicious custom jobs with system command execution.

Action-Not Available
Vendor-getgravGetgrav
Product-gravGravCMS
CWE ID-CWE-862
Missing Authorization
Details not found