CVE-2026-44349
Daptin fuzzy search injects unvalidated column name into raw SQL
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Daptin is a GraphQL/JSON-API headless CMS. Prior to version 0.11.5, processFuzzySearch in server/resource/resource_findallpaginated.go:1484 splits the user-supplied column parameter by comma and interpolates each segment directly into goqu.L(fmt.Sprintf("LOWER(%s) LIKE ?", prefix+col)) raw SQL with no column whitelist check. The entry point is GET /api/<entity> with operator=fuzzy (or fuzzy_any, fuzzy_all). Any authenticated user โ including one who self-registered with no admin involvement โ can read the entire database. This issue has been patched in version 0.11.5.
| CWE | CWE-89 |
| Vendor | daptin |
| Product | daptin |
| Published | May 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for daptin daptin
Be the first to know when new unknown vulnerabilities affecting daptin daptin are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
daptin / daptin
< 0.11.5