String Concatenation in SQL Queries
The most common cause of SQL injection is directly concatenating user input into SQL query strings. This allows attackers to inject malicious SQL code that gets executed as part of the query. Developers often use string concatenation or template literals without realizing the security implications.
Preview example – JAVASCRIPT
// Vulnerable approach
const query = "SELECT * FROM users WHERE id = " + userId;
// Attacker input: "1 OR 1=1 --"
// Results in: SELECT * FROM users WHERE id = 1 OR 1=1 --