Request Data Concatenation in SQL
User-controlled Flask request data is concatenated or formatted into SQL strings without parameters, allowing attackers to inject arbitrary SQL.
Preview example – PYTHON
# VULNERABLE: Direct request data concatenation
@app.route('/user/<user_id>')
def get_user(user_id):
query = f"SELECT * FROM users WHERE id = {user_id}"
cursor.execute(query)
return cursor.fetchone()