Daptin is a GraphQL/JSON-API headless CMS. Prior to version 0.11.4, the /aggregate/:typename endpoint accepted column and group query parameters that were passed verbatim to goqu.L() — a raw SQL literal expression builder — without any validation. This bypassed all parameterization and allowed authenticated users with any valid session to inject arbitrary SQL expressions. This issue has been patched in version 0.11.4.
Metrics
Affected Vendors & Products
References
History
Thu, 07 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Daptin
Daptin daptin |
|
| Vendors & Products |
Daptin
Daptin daptin |
Thu, 07 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Daptin is a GraphQL/JSON-API headless CMS. Prior to version 0.11.4, the /aggregate/:typename endpoint accepted column and group query parameters that were passed verbatim to goqu.L() — a raw SQL literal expression builder — without any validation. This bypassed all parameterization and allowed authenticated users with any valid session to inject arbitrary SQL expressions. This issue has been patched in version 0.11.4. | |
| Title | Daptin vulnerable to SQL injection via unvalidated goqu.L() calls in aggregate API | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-07T14:57:04.226Z
Reserved: 2026-04-20T15:32:33.813Z
Link: CVE-2026-41422
Updated: 2026-05-07T14:56:04.834Z
Status : Deferred
Published: 2026-05-07T15:16:06.813
Modified: 2026-05-07T15:47:46.853
Link: CVE-2026-41422
No data.
OpenCVE Enrichment
Updated: 2026-05-07T15:30:05Z