During a web application security review, Jessica discovered that one of her organization’s applications is vulnerable to SQL injection attacks. Where would be the best place for Jessica to address the root cause issue?200- 250 words

 
During a web application security review, Jessica discovered that one of her organization’s applications is vulnerable to SQL injection attacks. Where would be the best place for Jessica to address the root cause issue?.
200- 250 words