CVE-2026-41422
Daptin vulnerable to SQL injection via unvalidated goqu.L() calls in aggregate API
CVSS Score
8.3
EPSS Score
0.0%
EPSS Percentile
0th
Daptin is a GraphQL/JSON-API headless CMS. Prior to version 0.11.4, the /aggregate/:typename endpoint accepted column and group query parameters that were passed verbatim to goqu.L() โ a raw SQL literal expression builder โ without any validation. This bypassed all parameterization and allowed authenticated users with any valid session to inject arbitrary SQL expressions. This issue has been patched in version 0.11.4.
| CWE | CWE-89 |
| Vendor | daptin |
| Product | daptin |
| Published | May 7, 2026 |
| Last Updated | May 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for daptin daptin
Be the first to know when new high vulnerabilities affecting daptin daptin are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
Low
Affected Versions
daptin / daptin
< 0.11.4