๐Ÿ” CVE Alert

CVE-2026-44349

UNKNOWN 0.0

Daptin fuzzy search injects unvalidated column name into raw SQL

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Daptin is a GraphQL/JSON-API headless CMS. Prior to version 0.11.5, processFuzzySearch in server/resource/resource_findallpaginated.go:1484 splits the user-supplied column parameter by comma and interpolates each segment directly into goqu.L(fmt.Sprintf("LOWER(%s) LIKE ?", prefix+col)) raw SQL with no column whitelist check. The entry point is GET /api/<entity> with operator=fuzzy (or fuzzy_any, fuzzy_all). Any authenticated user โ€” including one who self-registered with no admin involvement โ€” can read the entire database. This issue has been patched in version 0.11.5.

CWE CWE-89
Vendor daptin
Product daptin
Published May 7, 2026
Stay Ahead of the Next One

Get instant alerts for daptin daptin

Be the first to know when new unknown vulnerabilities affecting daptin daptin are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

daptin / daptin
< 0.11.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/daptin/daptin/security/advisories/GHSA-pwqg-q8pg-pp6r github.com: https://github.com/daptin/daptin/releases/tag/v0.11.5