Home

Description

Daptin is a GraphQL/JSON-API headless CMS. Prior to version 0.11.4, the /aggregate/:typename endpoint accepted column and group query parameters that were passed verbatim to goqu.L() — a raw SQL literal expression builder — without any validation. This bypassed all parameterization and allowed authenticated users with any valid session to inject arbitrary SQL expressions. This issue has been patched in version 0.11.4.

PUBLISHED Reserved 2026-04-20 | Published 2026-05-07 | Updated 2026-05-07 | Assigner GitHub_M




HIGH: 8.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

< 0.11.4
affected

References

github.com/...daptin/security/advisories/GHSA-rw2c-8rfq-gwfv

github.com/daptin/daptin/releases/tag/v0.11.4

cve.org (CVE-2026-41422)

nvd.nist.gov (CVE-2026-41422)

Download JSON