Daptin Headless CMS SQLi Puts Data at High Risk

Daptin Headless CMS SQLi Puts Data at High Risk

The National Vulnerability Database (NVD) reports a critical SQL injection vulnerability, CVE-2026-41422, in Daptin, a GraphQL/JSON-API headless CMS. Prior to version 0.11.4, the /aggregate/:typename endpoint allowed authenticated users to inject arbitrary SQL expressions. This was possible because the column and group query parameters were passed directly to goqu.L(), a raw SQL literal expression builder, without any validation or sanitization. This effectively bypassed all parameterization, enabling a high-impact data compromise.

With a CVSS score of 8.3 (HIGH), this flaw (CWE-89) presents a serious risk. Any authenticated user with a valid session could exploit this to achieve high confidentiality and integrity impacts, along with a moderate availability impact. This isn’t just about data exposure; it’s about full control over the underlying database, allowing attackers to read, modify, or even delete sensitive information.

Defenders using Daptin must prioritize patching. This isn’t a theoretical risk; it’s a direct path to database compromise. Attackers are constantly scanning for unpatched, internet-facing applications with known SQLi vectors. A headless CMS, by its nature, often handles critical content and data, making it a prime target for data exfiltration and integrity attacks.

What This Means For You

  • If your organization uses Daptin, check your version immediately. Patch to 0.11.4 or higher to mitigate CVE-2026-41422. Audit logs for any suspicious activity involving the `/aggregate/:typename` endpoint, especially from authenticated users, as this vulnerability allows full database manipulation.

Indicators of Compromise

IDTypeIndicator
CVE-2026-41422 SQLi Daptin /aggregate/:typename endpoint
CVE-2026-41422 SQLi Daptin versions prior to 0.11.4
CVE-2026-41422 SQLi Vulnerable parameters: column, group
🔎
Daptin SQLi: Check Your Exposure Use /brief for an analyst-ready weekly threat summary with severity rankings and key IOCs.
Open Intel Bot →
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 07, 2026 at 18:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-44264 — Weblate is a web based localization tool. Prior to version

CVE-2026-44264 — Weblate is a web based localization tool. Prior to version 5.17.1, the Markdown renderer used in user comments and other user-provided content didn't...

vulnerabilityCVEmedium-severitycwe-80
/SCW Vulnerability Desk /MEDIUM /4.3 /⚑ 2 IOCs

CVE-2026-44263 — Weblate is a web based localization tool. Prior to version

CVE-2026-44263 — Weblate is a web based localization tool. Prior to version 5.17.1, the screenshots, tasks, and component link API allowed for the enumeration of...

vulnerabilityCVEmedium-severitycwe-203
/SCW Vulnerability Desk /MEDIUM /4.3 /⚑ 2 IOCs /⚙ 6 Sigma

gnutls CVE-2026-42011: Certificate Validation Bypass Poses MITM Risk

CVE-2026-42011 — A flaw was found in gnutls. This vulnerability occurs because permitted name constraints were incorrectly ignored when previous Certificate Authorities (CAs) only had...

vulnerabilityCVEhigh-severitycwe-295
/SCW Vulnerability Desk /HIGH /7.4 /⚑ 2 IOCs