Arbitrary SQL Injection in Daptin Headless CMS
CVE-2026-41422

8.3HIGH

Key Information:

Vendor

Daptin

Status
Vendor
CVE Published:
7 May 2026

What is CVE-2026-41422?

Daptin, a GraphQL/JSON-API headless CMS, was found to have a vulnerability in its /aggregate/:typename endpoint prior to version 0.11.4. The endpoint accepted column and group query parameters without validating them, leading to a serious security risk. Authenticated users with valid sessions could exploit this flaw to inject and execute arbitrary SQL expressions directly against the database, potentially exposing sensitive information or compromising the integrity of the application. This issue was addressed in version 0.11.4, which implemented necessary validation measures to mitigate the risk.

Affected Version(s)

daptin < 0.11.4

References

CVSS V3.1

Score:
8.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.