Static analysis includes control flow analysis, data flow analysis, pointer analysis, and taint analysis. Grounded in abstract interpretation theory, these methods analyze programs across different abstract domains to extract program information for tasks such as compilation optimization and program comprehension, as well as vulnerability detection. Injection vulnerabilities, such as command injection and SQL injection, arise when external inputs reach sensitive functions. For detecting injection vulnerabilities, static analysis primarily employs two approaches: rule matching and taint analysis. The rule matching approach uses pattern-based templates to identify vulnerabilities, which tends to yield a high false positive rate. The taint analysis approach detects vulnerabilities by tracking the flow of tainted data from sources to sensitive sinks, though its effectiveness depends on the completeness of both taint sources and propagation rules. This paper employed a string constant propagation algorithm to analyze variable-referenced string information within programs, followed by a dangerous function parameter analysis algorithm based on the string information to detect injection vulnerabilities. The proposed method which named ConstStringDetect, was implemented on the open-source Java static analysis framework Tai-e. Experiments were conducted on the Juliet Java v1.3 and OWASP v1.2 benchmark suites, covering three types of injection vulnerabilities: CWE-078 (OS command injection), CWE-089 (SQL injection), and CWE-090 (LDAP injection). Compared to state-of-the-art static vulnerability detection tools such as SpotBugs and CodeQL, the method proposed in this paper achieves a higher recall rate than CodeQL and a significantly lower false positive rate than SpotBugs, even without relying on specific function rules.