FixVibe

// código / holofote

openDCIM Command Injection Source Advisory

A database-controlled Graphviz path should not become a shell command.

A pegada

openDCIM is often deployed close to data-center inventory, racks, power, and network maps. CVE-2026-28517 sits in report generation: a Graphviz `dot` command path read from configuration can reach shell execution if the vulnerable source pattern is present.

Como funciona

The repo check looks for `report_network_map.php` source where the openDCIM `dot` configuration value flows into PHP `exec()` without recognized shell escaping. The signal is intentionally narrow: file-specific, configuration-specific, and source-only.

O raio de impacto

If the affected file is deployed and an attacker can influence the `dot` configuration path under the conditions described by the advisory, command execution may affect the openDCIM host. A repo match should drive an upgrade or patch review before anyone treats it as confirmed production compromise.

// what fixvibe checks

What FixVibe checks

FixVibe repo scans look for high-confidence security patterns and dependency risk in source context. Reports identify the affected area and recommended fix. For check-specific questions about exact detection heuristics, active payload details, or source-code rule patterns, contact support@fixvibe.app.

Defesas blindadas

Upgrade openDCIM to a fixed release or apply the upstream patch. If maintaining a fork, validate the Graphviz executable path against a strict allowlist, avoid shell command strings where possible, escape any remaining shell boundary, and rerun the repo scan after patching.

// rode no seu próprio app

Continue publicando enquanto o FixVibe vigia.

O FixVibe pressiona a superfície pública do seu app do jeito que um atacante faria — sem agente, sem instalação, sem cartão. Continuamos pesquisando novos padrões de vulnerabilidade e transformando isso em checks práticos e fixes prontos para Cursor, Claude e Copilot.

Código fonte
58
testes nessa categoria
módulos
20
checks dedicados de código fonte
todo scan
397+
testes em todas as categorias
  • Grátis — sem cartão, sem instalação, sem ping de Slack
  • Só colar uma URL — a gente crawla, sonda e reporta
  • Achados classificados por severidade, deduplicados no sinal
  • Prompts de fix atuais, prontos para colar no Cursor, Claude, Copilot
Rodar um scan grátis

// checks atuais · fixes práticos · publique com confiança

openDCIM Command Injection Source Advisory — Holofote de Vulnerabilidade | FixVibe · FixVibe