S R,
By default, Kentico sanitizes all SQL requests to ensure there is no SQL injection. That is UNLESS you tell it otherwise by using a macro or manually write code that allows SQL injection.
Secondly, regarding this statement "Since the query referenced in the original question was executed internally using the Kentico database account, it's unclear whether this constitutes a true SQL injection attack."
Kentico has 1 connection string, by default, that is used for all calls to the database. There typically is another connection string or user name and password combination unless someone codes it in. All requests are made using the main connection string. This includes dynamically created queries created in the Kentico UI by Kentico or user created objects, queries created in code, queries generated when someone uses the Kentico API to make calls, form submissions from custom created forms, etc. Any and all of the above, if structured correctly, could result in a SQL injection attack.
This is why Kentico strongly recommends using the API when making calls because it does a better job of protecting the data and overall system than someone using SQL on their own.