Skip to main content
JG is here with you ✨
A05:2025

Injection

SQL, NoSQL, OS Command, LDAP Injection

Classic Attack

What is Injection?

Injection flaws occur when untrusted data is sent to an interpreter as part of a command or query. The attacker's hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization.

SQL InjectionNoSQL InjectionOS CommandLDAP

SQL Injection

Manipulate SQL queries to bypass authentication or extract data

Examples: ' OR '1'='1, UNION SELECT

NoSQL Injection

Exploit NoSQL databases like MongoDB with operator injection

Examples: {"$ne": ""}, {"$gt": ""}

Command Injection

Execute arbitrary OS commands on the host system

Examples: ; ls -la, | cat /etc/passwd

LDAP Injection

Manipulate LDAP queries in directory services

Examples: *)(uid=*))(|(uid=*

XPath Injection

Manipulate XPath queries in XML documents

Examples: ' or '1'='1

Template Injection

Inject into server-side template engines

Examples: {{7*7}}, ${7*7}

Related CWE Entries

Built by an OWASP Member • Part of the OWASP Web Security Lab Series

Open to AI-Focused Roles

AI Sales • AI Strategy • AI Success • Creative Tech • Toronto / Remote

Let's connect →
Terms of ServiceLicense AgreementPrivacy Policy
Copyright © 2026 JMFG. All rights reserved.