SiteShadow
Back to vulnerability library

CWE-564 Hibernate SQL Injection

What this means

SiteShadow flagged ORM/query-builder usage where untrusted input is concatenated into a query string (HQL/JPQL/criteria-like strings). ORMs don't automatically prevent injection if you build query strings manually.

Why it matters

Injection is still possible when using ORM query strings unsafely.

Safer examples

1) Use parameter binding (don't concatenate)

Always bind parameters instead of stitching user input into query strings.

2) Allowlist sort/filter fields

If you let users choose sort/field names, map choices to known column names rather than trusting raw input (see API01).

3) Use least-privilege DB accounts

Even with safe queries, restrict DB permissions to minimize blast radius.

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage