VYPR
High severity8.3GHSA Advisory· Published May 7, 2026· Updated May 7, 2026

CVE-2026-41422

CVE-2026-41422

Description

Daptin is a GraphQL/JSON-API headless CMS. Prior to version 0.11.4, the /aggregate/:typename endpoint accepted column and group query parameters that were passed verbatim to goqu.L() — a raw SQL literal expression builder — without any validation. This bypassed all parameterization and allowed authenticated users with any valid session to inject arbitrary SQL expressions. This issue has been patched in version 0.11.4.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/daptin/daptinGo
< 0.11.40.11.4

Affected products

2
  • Daptin/Daptinllm-fuzzy2 versions
    < 0.11.4+ 1 more
    • (no CPE)range: < 0.11.4
    • (no CPE)range: < 0.11.4

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.