Command Injection is a web security vulnerability where an attacker executes arbitrary system commands on a host operating system. It occurs when user-supplied input is processed by a system shell, bypassing proper input validation and allowing malicious commands to run. This can lead to full system compromise.