Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2026-41422
Published:April 22, 2026
Updated:April 23, 2026
Summary The "/aggregate/:typename" endpoint accepted "column" and "group" query parameters that were passed verbatim to "goqu.L()" — a raw SQL literal expression builder — without any validation. This bypassed all parameterization and allowed authenticated users with any valid session to inject arbitrary SQL expressions. Impact An authenticated low-privilege user could: - Extract data from any table via subquery: "(SELECT group_concat(email) FROM user_account) as leak" - Disclose database internals: "sqlite_version()", "(SELECT sql FROM sqlite_master)" - Exfiltrate cross-table data via correlated subqueries The vulnerability was confirmed locally; "user_account.email" values were extracted via a crafted "column" parameter by a non-admin user. Root Cause "goqu.L(userInput)" in "server/resource/resource_aggregate.go" inserted user-supplied query parameters directly into the SQL string with no validation. Fix (v0.11.4) All "goqu.L()" calls on user-controlled input were eliminated and replaced with: - Structural expression parsing supporting all documented API forms - Schema-based column validation (column names checked against entity schema via "TableInfo().GetColumnByName()") - Exact-match allowlist for aggregate functions ("count", "sum", "avg", "min", "max", "first", "last") and scalar functions ("date", "strftime", "upper", "lower", etc.) - Safe goqu constructors ("goqu.I()", "goqu.SUM()", "goqu.Func()") for all generated expressions - "allowedTables" scope enforcement: qualified column refs ("table.col") validated against root entity + explicitly joined tables only Two additional DoS bugs were fixed in the same commit: "uuid.MustParse" panic on malformed UUID input and an index-out-of-range panic in "ToOrderedExpressionArray" on empty sort expressions. Credits Reported by @VashuVats.
Affected Packages
https://github.com/daptin/daptin.git (GITHUB):
Affected version(s) >=v0.1.0 <v0.11.4
Fix Suggestion:
Update to version v0.11.4
github.com/daptin/daptin (GO):
Affected version(s) >=v0.0.0-20191125122710-0a795975409d <v0.11.4
Fix Suggestion:
Update to version v0.11.4
Do you need more information?
Contact Us
CVSS v4
Base Score:
8.7
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
LOW
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
8.3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
LOW
Weakness Type (CWE)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')