Skip to content

Commit f029929

Browse files

File tree

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-428h-8xhf-g3cw",
4+
"modified": "2026-02-28T00:31:02Z",
5+
"published": "2026-02-28T00:31:02Z",
6+
"aliases": [
7+
"CVE-2026-28517"
8+
],
9+
"details": "openDCIM version 23.04, through commit 4467e9c4, contains an OS command injection vulnerability in report_network_map.php. The application retrieves the 'dot' configuration parameter from the database and passes it directly to exec() without validation or sanitation. If an attacker can modify the fac_Config.dot value, arbitrary commands may be executed in the context of the web server process.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28517"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/opendcim/openDCIM/pull/1664"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/opendcim/openDCIM/pull/1664/changes/8f7ab2a710086a9c8c269560793e47c577ddda09"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://chocapikk.com/posts/2026/opendcim-sqli-to-rce"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://github.com/Chocapikk/opendcim-exploit"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://github.com/opendcim/openDCIM/blob/4467e9c4/report_network_map.php#L467"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/opendcim/openDCIM/blob/4467e9c4/report_network_map.php#L7"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://www.vulncheck.com/advisories/opendcim-os-command-injection-via-dot-configuration-parameter"
49+
}
50+
],
51+
"database_specific": {
52+
"cwe_ids": [
53+
"CWE-78"
54+
],
55+
"severity": "CRITICAL",
56+
"github_reviewed": false,
57+
"github_reviewed_at": null,
58+
"nvd_published_at": "2026-02-27T23:16:06Z"
59+
}
60+
}

advisories/unreviewed/2026/02/GHSA-558g-hvr5-cchr/GHSA-558g-hvr5-cchr.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-558g-hvr5-cchr",
4-
"modified": "2026-02-24T15:30:27Z",
4+
"modified": "2026-02-28T00:31:01Z",
55
"published": "2026-02-20T00:31:53Z",
66
"aliases": [
77
"CVE-2025-13672"
88
],
99
"details": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in OpenText™ Web Site Management Server allows Reflected XSS. The vulnerability could allow injecting malicious JavaScript inside URL parameters that was then rendered with the preview of the page, so that malicious scripts could be executed on the client side.\n\nThis issue affects Web Site Management Server: 16.7.0, 16.7.1.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:L/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:N/R:U/V:D/RE:H/U:Red"

advisories/unreviewed/2026/02/GHSA-5jm3-f2cq-hw7c/GHSA-5jm3-f2cq-hw7c.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5jm3-f2cq-hw7c",
4-
"modified": "2026-02-20T00:31:53Z",
4+
"modified": "2026-02-28T00:31:01Z",
55
"published": "2026-02-20T00:31:53Z",
66
"aliases": [
77
"CVE-2025-8054"
88
],
99
"details": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in OpenText™ XM Fax allows Path Traversal. \n\nThe vulnerability could allow an attacker to arbitrarily disclose content of files on the local filesystem. This issue affects XM Fax: 24.2.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:A/V:D/RE:M/U:Amber"

advisories/unreviewed/2026/02/GHSA-5qq8-6gv4-wmcc/GHSA-5qq8-6gv4-wmcc.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5qq8-6gv4-wmcc",
4-
"modified": "2026-02-18T18:30:39Z",
4+
"modified": "2026-02-28T00:31:00Z",
55
"published": "2026-02-18T18:30:39Z",
66
"aliases": [
77
"CVE-2025-15579"

advisories/unreviewed/2026/02/GHSA-fg7c-375r-xggv/GHSA-fg7c-375r-xggv.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fg7c-375r-xggv",
4-
"modified": "2026-02-24T15:30:27Z",
4+
"modified": "2026-02-28T00:31:01Z",
55
"published": "2026-02-20T00:31:53Z",
66
"aliases": [
77
"CVE-2025-9208"
88
],
99
"details": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in OpenText™ Web Site Management Server allows Stored XSS. The vulnerability could execute malicious scripts on the client side when the download query parameter is removed from the file URL, allowing attackers to compromise user sessions and data.\n\nThis issue affects Web Site Management Server: 16.7.X, 16.8, 16.8.1.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:N/R:U/V:D/RE:H/U:Red"

advisories/unreviewed/2026/02/GHSA-fqr4-q363-g7gm/GHSA-fqr4-q363-g7gm.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fqr4-q363-g7gm",
4-
"modified": "2026-02-24T15:30:27Z",
4+
"modified": "2026-02-28T00:31:01Z",
55
"published": "2026-02-20T00:31:53Z",
66
"aliases": [
77
"CVE-2025-13671"
88
],
99
"details": "Cross-Site Request Forgery (CSRF) vulnerability in OpenText™ Web Site Management Server allows Cross Site Request Forgery. The vulnerability could make a user, with active session inside the product, click on a page that contains this malicious HTML triggering to perform changes unconsciously.\n\nThis issue affects Web Site Management Server: 16.7.0, 16.7.1.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:H/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:N/R:U/V:D/RE:H/U:Red"
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-mg2w-x76x-59h8",
4+
"modified": "2026-02-28T00:31:02Z",
5+
"published": "2026-02-28T00:31:02Z",
6+
"aliases": [
7+
"CVE-2026-28515"
8+
],
9+
"details": "openDCIM version 23.04, through commit 4467e9c4, contains a missing authorization vulnerability in install.php and container-install.php. The installer and upgrade handler expose LDAP configuration functionality without enforcing application role checks. Any authenticated user can access this functionality regardless of assigned privileges. In deployments where REMOTE_USER is set without authentication enforcement, the endpoint may be accessible without credentials. This allows unauthorized modification of application configuration.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28515"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/opendcim/openDCIM/pull/1664"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/opendcim/openDCIM/pull/1664/changes/8f7ab2a710086a9c8c269560793e47c577ddda09"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://chocapikk.com/posts/2026/opendcim-sqli-to-rce"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://github.com/Chocapikk/opendcim-exploit"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://github.com/opendcim/openDCIM/blob/4467e9c4/container-install.php#L421-L435"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/opendcim/openDCIM/blob/4467e9c4/install.php#L293"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://github.com/opendcim/openDCIM/blob/4467e9c4/install.php#L420-L434"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://www.vulncheck.com/advisories/opendcim-missing-authorization-in-install-php"
53+
}
54+
],
55+
"database_specific": {
56+
"cwe_ids": [
57+
"CWE-862"
58+
],
59+
"severity": "CRITICAL",
60+
"github_reviewed": false,
61+
"github_reviewed_at": null,
62+
"nvd_published_at": "2026-02-27T23:16:05Z"
63+
}
64+
}
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-pmx8-fmc2-4rjp",
4+
"modified": "2026-02-28T00:31:02Z",
5+
"published": "2026-02-28T00:31:01Z",
6+
"aliases": [
7+
"CVE-2026-27759"
8+
],
9+
"details": "Featured Image from Content (featured-image-from-content) WordPress plugin versions prior to 1.7 contain an authenticated server-side request forgery vulnerability that allows Author-level users to fetch internal HTTP resources. Attackers can exploit insecure URL fetching and file write operations to retrieve sensitive internal data and store it in web-accessible upload directories.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27759"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://wordpress.org/plugins/featured-image-from-content"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.vulncheck.com/advisories/featured-image-from-content-authenticated-ssrf-via-save-post"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-918"
34+
],
35+
"severity": "MODERATE",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2026-02-27T23:16:04Z"
39+
}
40+
}
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-prmh-rp39-qc4m",
4+
"modified": "2026-02-28T00:31:02Z",
5+
"published": "2026-02-28T00:31:02Z",
6+
"aliases": [
7+
"CVE-2026-28516"
8+
],
9+
"details": "openDCIM version 23.04, through commit 4467e9c4, contains a SQL injection vulnerability in Config::UpdateParameter. The install.php and container-install.php handlers pass user-supplied input directly into SQL statements using string interpolation without prepared statements or proper input sanitation. An authenticated user can execute arbitrary SQL statements against the underlying database.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28516"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/opendcim/openDCIM/pull/1664"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/opendcim/openDCIM/pull/1664/changes/8f7ab2a710086a9c8c269560793e47c577ddda09"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://chocapikk.com/posts/2026/opendcim-sqli-to-rce"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://github.com/Chocapikk/opendcim-exploit"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://github.com/opendcim/openDCIM/blob/4467e9c4/config.inc.php#L75-L90"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/opendcim/openDCIM/blob/4467e9c4/install.php#L420-L434"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://www.vulncheck.com/advisories/opendcim-sql-injection-in-config-updateparameter"
49+
}
50+
],
51+
"database_specific": {
52+
"cwe_ids": [
53+
"CWE-89"
54+
],
55+
"severity": "CRITICAL",
56+
"github_reviewed": false,
57+
"github_reviewed_at": null,
58+
"nvd_published_at": "2026-02-27T23:16:06Z"
59+
}
60+
}

advisories/unreviewed/2026/02/GHSA-rgf4-44r9-4r27/GHSA-rgf4-44r9-4r27.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,9 @@
3333
}
3434
],
3535
"database_specific": {
36-
"cwe_ids": [],
36+
"cwe_ids": [
37+
"CWE-787"
38+
],
3739
"severity": "MODERATE",
3840
"github_reviewed": false,
3941
"github_reviewed_at": null,

0 commit comments

Comments
 (0)