The security team at a company has been informed about an unusual behavior in the web application where unauthorized commands are being inserted into web forms, leading to commands running on the application's database. Which vulnerability is this web application most likely susceptible to?
Cross-site scripting (XSS)
Structured Query Language injection (SQLi)
Buffer overflow
Memory injection