CVE-2025-15439

MEDIUM5.3/ 10.0
Share:
Published: January 2, 2026 at 05:15 PM
Modified: January 8, 2026 at 06:09 PM
Source: cna@vuldb.com

Vulnerability Description

A vulnerability was identified in Daptin 0.10.3. Affected by this vulnerability is the function goqu.L of the file server/resource/resource_aggregate.go of the component Aggregate API. The manipulation of the argument column/group/order leads to sql injection. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS Metrics

Base Score
5.3
Severity
MEDIUM
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Weaknesses (CWE)

Source: cna@vuldb.com

AI Security Analysis

01 // Technical Summary

Daptin 0.10.3 suffers from a critical SQL injection vulnerability in its Aggregate API, allowing attackers to remotely execute arbitrary SQL commands. This flaw, stemming from improper sanitization of user-supplied input within the goqu.L function, can lead to complete database compromise and data exfiltration.

02 // Vulnerability Mechanism

Step 1: Payload Delivery: The attacker crafts a malicious payload containing SQL injection code. This payload is designed to manipulate the column, group, or order parameters of the Aggregate API endpoint.

Step 2: Request Submission: The attacker sends the crafted payload as part of an HTTP request to the vulnerable Aggregate API endpoint. The request targets the goqu.L function.

Step 3: Query Construction: The application receives the request and, due to the vulnerability, directly incorporates the attacker-supplied payload into the SQL query without proper sanitization.

Step 4: Query Execution: The database server executes the maliciously crafted SQL query. The injected code alters the intended behavior of the query.

Step 5: Data Exfiltration/Manipulation: Depending on the injected SQL code, the attacker can then exfiltrate sensitive data, modify existing data, or potentially gain remote code execution on the database server.

03 // Deep Technical Analysis

The vulnerability lies within the goqu.L function in server/resource/resource_aggregate.go of Daptin 0.10.3. This function is responsible for handling column, group, and order parameters within the Aggregate API. The root cause is the lack of proper input validation and sanitization of user-controlled input used to construct SQL queries. Specifically, the application directly incorporates user-provided values for column, group, or order parameters into the SQL query without escaping special characters or validating the input against a whitelist. This allows an attacker to inject malicious SQL code, such as adding additional WHERE clauses, modifying existing queries, or executing arbitrary commands through the database.

CVE-2025-15439 - MEDIUM Severity (5.3) | Free CVE Database | 4nuxd