Vulnerability Description
Daptin is a GraphQL/JSON-API headless CMS. Prior to version 0.11.4, the /aggregate/:typename endpoint accepted column and group query parameters that were passed verbatim to goqu.L() — a raw SQL literal expression builder — without any validation. This bypassed all parameterization and allowed authenticated users with any valid session to inject arbitrary SQL expressions. This issue has been patched in version 0.11.4.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/daptin/daptin/releases/tag/v0.11.4
- https://github.com/daptin/daptin/security/advisories/GHSA-rw2c-8rfq-gwfv
FAQ
What is CVE-2026-41422?
CVE-2026-41422 is a vulnerability with a CVSS score of 8.3 (HIGH). Daptin is a GraphQL/JSON-API headless CMS. Prior to version 0.11.4, the /aggregate/:typename endpoint accepted column and group query parameters that were passed verbatim to goqu.L() — a raw SQL liter...
How severe is CVE-2026-41422?
CVE-2026-41422 has been rated HIGH with a CVSS base score of 8.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-41422?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.