Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-pwqg-q8pg-pp6r | Daptin fuzzy search injects unvalidated column name into raw SQL |
Fri, 08 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Daptin
Daptin daptin |
|
| Vendors & Products |
Daptin
Daptin daptin |
Thu, 07 May 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Daptin is a GraphQL/JSON-API headless CMS. Prior to version 0.11.5, processFuzzySearch in server/resource/resource_findallpaginated.go:1484 splits the user-supplied column parameter by comma and interpolates each segment directly into goqu.L(fmt.Sprintf("LOWER(%s) LIKE ?", prefix+col)) raw SQL with no column whitelist check. The entry point is GET /api/<entity> with operator=fuzzy (or fuzzy_any, fuzzy_all). Any authenticated user — including one who self-registered with no admin involvement — can read the entire database. This issue has been patched in version 0.11.5. | |
| Title | Daptin fuzzy search injects unvalidated column name into raw SQL | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-08T14:22:45.728Z
Reserved: 2026-05-05T19:52:59.148Z
Link: CVE-2026-44349
Updated: 2026-05-08T14:22:33.533Z
Status : Deferred
Published: 2026-05-07T15:16:10.903
Modified: 2026-05-08T15:17:01.387
Link: CVE-2026-44349
No data.
OpenCVE Enrichment
Updated: 2026-05-07T15:30:06Z
Github GHSA