๐Ÿ” CVE Alert

CVE-2026-41422

HIGH 8.3

Daptin vulnerable to SQL injection via unvalidated goqu.L() calls in aggregate API

CVSS Score
8.3
EPSS Score
0.0%
EPSS Percentile
0th

Daptin is a GraphQL/JSON-API headless CMS. Prior to version 0.11.4, the /aggregate/:typename endpoint accepted column and group query parameters that were passed verbatim to goqu.L() โ€” a raw SQL literal expression builder โ€” without any validation. This bypassed all parameterization and allowed authenticated users with any valid session to inject arbitrary SQL expressions. This issue has been patched in version 0.11.4.

CWE CWE-89
Vendor daptin
Product daptin
Published May 7, 2026
Last Updated May 7, 2026
Stay Ahead of the Next One

Get instant alerts for daptin daptin

Be the first to know when new high vulnerabilities affecting daptin daptin are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
Low

Affected Versions

daptin / daptin
< 0.11.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/daptin/daptin/security/advisories/GHSA-rw2c-8rfq-gwfv github.com: https://github.com/daptin/daptin/releases/tag/v0.11.4