Concept Flow - How string concatenation creates vulnerabilities
User Input Received
Concatenate Input into SQL Query String
Query String with User Input
Send Query to Database
Database Executes Query
If Input Malicious -> Unexpected Behavior
Security Vulnerability Occurs
User input is joined directly into a SQL query string, which the database executes. If input is malicious, it can change the query meaning, causing vulnerabilities.