Key Information Vulnerability Type SQL Injection Vulnerability Vulnerability Location method Vulnerable Code Snippet Vulnerability Analysis The class is insecure, and its parameters are controllable by users. Further tracing reveals the presence of SQL injection risks. HTTP Request Example Summary The vulnerability exists in the interface. Due to the controllable parameters in the class, it introduces an SQL injection risk. Attackers can exploit this vulnerability by crafting malicious requests to perform SQL injection attacks.