This vulnerability occurs when an application fails to properly sanitize or escape special characters that function as record separators in data streams. When untrusted input containing these delimiters is passed to a downstream system, it can corrupt data structures, cause misinterpretation of records, or trigger unauthorized actions.
Imagine your application accepts user input—like a form field for a name or address—and later packages that data into a structured format like a CSV file, a log entry, or a protocol message. If an attacker submits input containing a record delimiter (such as a newline, pipe character, or custom separator), and your code doesn't neutralize it, that input can break the expected record boundaries. The downstream parser, whether it's a database, a reporting tool, or another service, will then misinterpret where one record ends and the next begins, leading to data corruption, injection of false records, or logic errors. In practice, this flaw allows data to escape its intended context. For example, a single input field could be parsed as multiple separate records, or critical delimiters could be missing, causing entire records to be merged or skipped. To prevent this, you must always validate and sanitize input by escaping or removing delimiter characters based on the specific data format and context before processing or transmitting the data.
Impact: Unexpected State
Strategy: Input Validation
Strategy: Output Encoding
Strategy: Input Validation