OWASP API Top 10

The 10 most critical API security risks. If your app has an API (and it probably does), these are the vulnerabilities you need to check first.

10 vulnerabilities

Broken Object Level Authorization (BOLA)

high

API endpoints don't verify that the requesting user owns the resource they're accessing — allowing attackers to access other users' data by changing object IDs.

CWE-639API1:2023

Broken Authentication (API)

high

API authentication mechanisms are weak or improperly implemented — JWT without proper validation, tokens not in httpOnly cookies, or missing token expiration.

CWE-287API2:2023

Broken Object Property Level Authorization

medium

API allows users to read or modify object properties they shouldn't have access to — mass assignment, excessive data exposure, or missing field-level access control.

CWE-915API3:2023

Unrestricted Resource Consumption

medium

API endpoints without rate limiting, pagination, or resource limits — allowing attackers to exhaust server resources, rack up costs, or extract large datasets.

CWE-770API4:2023

Broken Function Level Authorization

high

Admin or privileged API endpoints accessible to regular users — missing role checks allow privilege escalation to administrative functions.

CWE-285API5:2023

Unrestricted Sensitive Flows

medium

Business-critical flows like registration, password reset, or purchase lack bot protection such as CAPTCHA, rate limiting, or device fingerprinting.

CWE-799API6:2023

Server-Side Request Forgery (SSRF) in API

high

The API fetches a URL provided by the user without validation, allowing attackers to probe internal services, cloud metadata endpoints, or private networks.

CWE-918API7:2023

Security Misconfiguration (API)

medium

APIs expose excessive information through open CORS policies, verbose error messages, missing security headers, or default configurations that were never hardened.

CWE-16API8:2023

Improper Inventory Management

low

Multiple API versions remain active without documentation or deprecation, leaving old endpoints with known vulnerabilities accessible to attackers.

CWE-1059API9:2023

Unsafe API Consumption

medium

Your API blindly trusts responses from third-party APIs without validation, allowing attackers to exploit upstream services to compromise your application.

CWE-20API10:2023