Property
Languagephp
Severitymedium
CWECWE-89: Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
OWASPA01:2017 - Injection
Confidence LevelLow
Impact LevelHigh
Likelihood LevelLow

Description#

The code builds SQL queries by directly concatenating variables into the query string when using Doctrine DBAL methods. This practice is unsafe if any variable data comes from user input, as it can allow malicious input to alter the query.

Impact#

If exploited, an attacker could inject arbitrary SQL commands, potentially exposing, modifying, or deleting data in your database. This could lead to data breaches, loss of data integrity, or full compromise of the application’s backend.