Skip to content

SQL injection vulnerability in feedback submission endpoint #9

@codeCraft-Ritik

Description

@codeCraft-Ritik

Summary:

The feedback endpoint directly inserts user input into SQL without sanitization or parameterized queries, enabling SQL injection.

Description:

User-controlled values from POST are assigned directly and interpolated into SQL:

  • name
  • email
  • comment

No escaping or prepared statements are used.

Steps to Reproduce:

  1. Open feedback form.
  2. Submit a crafted payload in comment or name field (for example quote-based injection string).
  3. Observe SQL behavior deviation or error output.

Expected:

Input should be parameterized and safely handled.

Actual:

Raw input is embedded into SQL query string.

Impact:

Critical security risk: data tampering, unauthorized query execution, possible data loss/exfiltration.

Suggested Labels:

security, backend, sql-injection, high priority

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions