VYPR
High severityGHSA Advisory· Published May 7, 2026· Updated May 8, 2026

CVE-2026-44349

CVE-2026-44349

Description

Daptin is a GraphQL/JSON-API headless CMS. Prior to version 0.11.5, processFuzzySearch in server/resource/resource_findallpaginated.go:1484 splits the user-supplied column parameter by comma and interpolates each segment directly into goqu.L(fmt.Sprintf("LOWER(%s) LIKE ?", prefix+col)) raw SQL with no column whitelist check. The entry point is GET /api/<entity> with operator=fuzzy (or fuzzy_any, fuzzy_all). Any authenticated user — including one who self-registered with no admin involvement — can read the entire database. This issue has been patched in version 0.11.5.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/daptin/daptinGo
< 0.11.50.11.5

Affected products

2
  • Daptin/DaptinGHSA2 versions
    <= 0.11.4+ 1 more
    • (no CPE)range: <= 0.11.4
    • (no CPE)range: <0.11.5

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.