An attack which exploits the concatenation of untrusted input with a prompt constructed by a higher-trust party such as the application designer.
Sources:
NIST AI 100-2e2025