String Interpolation with User Input
HTTP request data is directly inserted into SQL queries using string concatenation, format(), or f-strings.
SQL injection vulnerability where user-controlled request data is interpolated into SQL strings instead of using parameters or the ORM, potentially allowing attackers to exfiltrate or corrupt data, escalate privileges, or destroy tables.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
HTTP request data is directly inserted into SQL queries using string concatenation, format(), or f-strings.
Sourcery automatically identifies sql injection from http request data in raw sql string in django and many other security issues in your codebase.