The software constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component. Many injection attacks involve the disclosure of important information -- in terms of both data sensitivity and usefulness in further exploitation.
In some cases, injectable code controls authentication; this may lead to a remote vulnerability.
Injection attacks are characterized by the ability to significantly change the flow of a given process, and in some cases, to the execution of arbitrary code.
Data injection attacks lead to loss of data integrity in nearly all cases as the control-plane data injected is always incidental to data recall or writing.
Often the actions performed by injected control code are unlogged.
The weakness is introduced during Architecture and Design, Implementation stages.
Latest vulnerabilities for CWE-74
Description of CWE-74 on Mitre website