Django SQL Injection
criticalDetects SQL injection where user input flows to cursor.execute() without proper parameterization
Detects SQL injection where user input flows to cursor.execute() without proper parameterization
Experiment with the vulnerable code and security rule below. Edit the code to see how the rule detects different vulnerability patterns.
pathfinder scan --rule cpf/python-sqli-executeExplore related security rules for Python
Common questions about Django SQL Injection
Use Code Pathfinder to scan your Python codebase and automatically detect instances of this vulnerability pattern. Install Code Pathfinder and run the following command in your project directory:
pathfinder scan --rule cpf/python-sqli-executeThis rule is aligned with industry-standard security frameworks and classifications: