Command injection vulnerabilities occur when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell. In this case, the attacker could execute arbitrary commands on the host operating system.
A command injection vulnerability could lead to data loss, corruption, or unauthorized access to sensitive data.
Always sanitize and validate user input before using it in a system command and avoid directly incorporating user input into system commands where possible.