LIVE NEWSROOM · --:-- · May 24, 2026
A LIBRARY FOR SECURITY RESEARCHERS

OWASP TOP 10  /  A03:2021

Injection

Untrusted input is interpreted as a command or query — SQL, OS command, LDAP injection, and cross-site scripting (XSS).

Injection happens whenever user-controlled data is sent to an interpreter without proper separation of code and data. SQL injection, command injection, and XSS are the classic examples.

It remains one of the most damaging risks because a single flaw can expose an entire database or execute code.

How to prevent it

Use parameterized queries / prepared statements, context-aware output encoding, allowlist input validation, and safe APIs.

Mapped weaknesses (CWE)

Free tools to test for it

Related terms

Part of the OWASP Top 10 reference. See also the CWE weaknesses and Web Security hub.

Scroll to Top