Improper input validation[1] or unchecked user input is a type of vulnerability in computer software that may be used for security exploits.
[2] This vulnerability is caused when "[t]he product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.
"[1] Examples include: This security software article is a stub.
You can help Wikipedia by expanding it.