Raw SQL with User Input
User input is directly incorporated into raw SQL queries without parameter binding.
SQL injection vulnerability where user input flows into raw SQL or dynamic identifiers without binding or whitelisting, bypassing Laravel escaping and enabling attacker-controlled SQL syntax, potentially allowing attackers to read or alter sensitive data, escalate privileges, or run destructive statements, causing data breaches and compromising system integrity.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
User input is directly incorporated into raw SQL queries without parameter binding.
Sourcery automatically identifies sql injection from http request data in laravel query builder and many other security issues in your codebase.