You are leading a penetration test against a web application that handles sensitive customer data. During the assessment, the penetration testers discover a SQL injection vulnerability that could allow an attacker to gain access to the entire database. The development team is aware of the vulnerability but has not yet implemented a fix due to other project priorities. The application is considered business critical. What is the BEST course of action? A. Immediately shut down the web application to protect the sensitive customer data. B. Inform the development team and business stakeholders of the vulnerability and its potential impact, and recommend immediate remediation, even if it requires delaying other projects. C. Document the vulnerability in the penetration test report and recommend that the development team address it in the next scheduled maintenance window. D. Implement a web application firewall (WAF) as a temporary mitigation measure and schedule a follow-up penetration test after the development team has implemented a fix.