Template Literal SQL Injection
JavaScript template literals (backticks) provide convenient string interpolation but create serious SQL injection vulnerabilities when used to build database queries with user input. The ${} syntax performs direct substitution without any escaping.
Preview example – JAVASCRIPT
// VULNERABLE: Template literals in SQL queries
function getUserByEmail(email) {
// Direct interpolation - SQL injection risk!
const query = `SELECT * FROM users WHERE email = '${email}'`;
return db.query(query);
}
// Attack: email = "'; DROP TABLE users; --"