SiteShadow
Back to vulnerability library

SCP11 Database Security

What this means

SiteShadow flagged database access patterns that are risky: query construction from untrusted input, overly broad DB permissions, missing parameterization, or unsafe ORM usage.

Why it matters

Unsafe database access can expose or corrupt sensitive data.

Safer examples

1) Parameterize queries (never concatenate)

cursor.execute("SELECT * FROM users WHERE email = %s", (email,))

2) Allowlist sort/filter fields

If users choose sort fields, map choices to known column names rather than trusting raw input.

3) Use least-privilege DB accounts

Split "read-only" vs "write" roles; restrict schema access; avoid admin DB users in apps.

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage