Second order SQL injection
This type of attack is more insidious because the malicious SQL code does not need to immediately result in a SQL syntax error or other obvious issues, making it harder to detect with standard input validation techniques.
The injection occurs upon the second use of the data when it is retrieved and used in a SQL command, hence the name "Second Order".