This weakness occurs when an application makes an excessive number of individual data queries to a server or database, instead of using more efficient methods like stored procedures or batch operations.
This pattern forces the server to process many small, inefficient requests, which consumes significant computational resources and slows down the entire application. The performance impact becomes more severe as user load increases, directly affecting scalability and user experience. While the exact threshold for "excessive" queries depends on context, the CISQ standard recommends limiting inefficient functions to a maximum of five data accesses. If an attacker can trigger these inefficient code paths, the performance degradation can be exploited to cause denial-of-service conditions or system instability.
Impact: Reduce Performance