CVE-2026-41422 PUBLISHED

Daptin vulnerable to SQL injection via unvalidated goqu.L() calls in aggregate API

Assigner: GitHub_M
Reserved: 20.04.2026 Published: 07.05.2026 Updated: 07.05.2026

Daptin is a GraphQL/JSON-API headless CMS. Prior to version 0.11.4, the /aggregate/:typename endpoint accepted column and group query parameters that were passed verbatim to goqu.L() — a raw SQL literal expression builder — without any validation. This bypassed all parameterization and allowed authenticated users with any valid session to inject arbitrary SQL expressions. This issue has been patched in version 0.11.4.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
CVSS Score: 8.3

Product Status

Vendor daptin
Product daptin
Versions
  • Version < 0.11.4 is affected

References

Problem Types

  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CWE