Concept Flow - How SQL injection exploits unsafe queries
User Input Entered
Input Concatenated into SQL Query
Query Sent to Database
Database Executes Query
If Input Contains SQL Code
Yes
Malicious SQL Runs - Data Leaked or Modified
No
Query Runs Normally
User input is directly added to a SQL query string. If input contains SQL code, it changes the query meaning, causing harmful effects.