BlogSecurity

OWASP API Security Top 10: What Changed and How to Protect Your APIs

APIs are now the primary attack surface for modern applications. The 2023 OWASP API Security Top 10 reflects how dramatically the threat landscape has shifted. This guide breaks down every category, explains what changed from 2019, and shows you how to test and remediate each vulnerability.

20 min readUpdated April 2026

Why API Security Is Now the #1 Attack Vector

APIs have become the connective tissue of modern software. Every mobile app, SaaS product, microservice, and third-party integration communicates through APIs. Gartner predicted that APIs would become the most frequent attack vector by 2022—and that prediction proved correct. Salt Security's 2024 API Security Report found that 94% of organizations experienced API security incidents in the prior twelve months, and the average organization has over 900 APIs in production.

The 2023 OWASP API Security Top 10 is a significant update from the 2019 edition. New entries include Broken Object Property Level Authorization (API3) and Unrestricted Access to Sensitive Business Flows (API6), reflecting real-world attack patterns that the 2019 list did not capture. Injection (SQL, command, XSS) dropped out of the top 10 entirely—not because it got safer, but because authorization and business logic flaws became comparatively more prevalent and damaging.

OWASP API Security Top 10 (2023): Full Breakdown

API1:2023

Broken Object Level Authorization (BOLA)

BOLA (formerly IDOR—Insecure Direct Object Reference) has topped the OWASP API list since 2019 and remains the most exploited API vulnerability. It occurs when an API endpoint accepts an object ID in a request but fails to verify that the authenticated user is authorized to access that specific object. An attacker simply increments or guesses object IDs to access other users' data.

Example attack:

GET /api/invoices/10042 → returns attacker's invoice
GET /api/invoices/10043 → returns another user's invoice (BOLA!)

Remediation: Implement object-level authorization checks on every endpoint. Never trust client-supplied IDs—always validate ownership server-side. Use indirect references (UUIDs, tokens) instead of sequential integers.

API2:2023

Broken Authentication

Authentication mechanisms in APIs are frequently misconfigured or implemented incorrectly. Common failures include: JWT tokens that are not verified server-side, weak or missing token expiry, credential stuffing with no rate limiting, API keys transmitted in URLs (logged in access logs), and password reset flows that bypass authentication entirely.

Remediation: Use industry-standard authentication libraries. Enforce token expiry and rotation. Implement rate limiting and account lockout. Never include credentials in URLs. Use short-lived JWTs with refresh token rotation.

API3:2023

Broken Object Property Level Authorization

New in 2023, this consolidates "Excessive Data Exposure" and "Mass Assignment" from the 2019 list. The vulnerability exists when an API allows users to read or write object properties they should not have access to. Mass assignment attacks occur when an API blindly binds all request body fields to internal objects, allowing attackers to set privileged fields like is_admin: true.

Remediation: Use explicit allow-lists for both request and response fields. Never pass raw request objects directly to your ORM. Return only the properties each user role is entitled to see.

API4:2023

Unrestricted Resource Consumption

Replaces "Lack of Resources and Rate Limiting" with a broader scope. This covers scenarios where APIs have no limits on request size, query complexity (GraphQL depth attacks), file upload sizes, third-party API call costs per user action, or execution timeouts. Resource exhaustion attacks can render services unavailable or generate massive unexpected cloud costs.

Remediation: Implement rate limiting per user, per IP, and per endpoint. Cap request body sizes. Set GraphQL query depth and complexity limits. Implement timeouts for all downstream calls. Monitor and alert on unusual usage spikes.

API5:2023

Broken Function Level Authorization

Different from BOLA (object-level), this vulnerability exists at the endpoint/function level. Admin-only endpoints are often accessible to regular users when authorization is not enforced on the server. Attackers probe for predictable admin endpoint patterns (/admin/, /internal/, HTTP method switching) and find that client-side UI hiding is the only "protection."

Remediation: Enforce role-based access control (RBAC) on every API endpoint at the middleware layer, not just in the UI. Audit admin functionality regularly. Use allowlist-based authorization rather than denylists.

API6:2023

Unrestricted Access to Sensitive Business Flows

New in 2023. This addresses automation abuse of legitimate business workflows—scraping inventory to corner a market, buying all limited-edition items, bulk coupon abuse, mass fake account creation, and credential stuffing at scale. The API is technically functioning correctly; the problem is that automated abuse is indistinguishable from legitimate usage.

Remediation: Implement bot detection and device fingerprinting. Add CAPTCHA to high-risk flows. Enforce purchase/signup velocity limits. Monitor for unusual behavioral patterns. Consider friction (email verification, phone verification) for sensitive flows.

API7:2023

Server-Side Request Forgery (SSRF)

SSRF vulnerabilities allow attackers to make the API server issue requests to internal services or metadata endpoints on their behalf. In cloud environments, a successful SSRF against the AWS metadata service at 169.254.169.254 can expose IAM credentials with production access. SSRF is especially dangerous when APIs accept user-controlled URLs for webhooks, image fetching, or link previews.

Remediation: Validate and sanitize all user-supplied URLs. Maintain an allowlist of permitted destinations. Block requests to private IP ranges and cloud metadata endpoints. Use IMDSv2 on AWS to require session tokens for metadata access.

API8:2023

Security Misconfiguration

The broadest category. Includes: permissive CORS policies (accepting * origins), verbose error messages exposing stack traces or database schemas, unnecessary HTTP methods enabled, missing security headers (HSTS, CSP, X-Content-Type), default credentials on API management gateways, and TLS misconfiguration.

Remediation: Use automated security header scanners in CI. Enforce strict CORS policies. Disable HTTP methods not in use. Return generic error messages to clients. Scan API gateways and proxies as part of your infrastructure security review.

API9:2023

Improper Inventory Management

Organizations often cannot enumerate all the APIs they expose. Shadow APIs (endpoints not in any documentation), zombie APIs (deprecated versions left running), and third-party integrations create attack surface that security teams cannot monitor. Attackers probe for v1, v2, beta, and internal API versions that often lack the security controls applied to the latest production API.

Remediation: Maintain an up-to-date API inventory with OpenAPI specifications. Decommission deprecated API versions. Use API gateways to enforce routing through known endpoints. Run discovery scans to find undocumented APIs in production.

API10:2023

Unsafe Consumption of APIs

New in 2023. This reflects the supply chain risk of the APIs your application consumes. When developers blindly trust third-party API responses—passing them to SQL queries, deserializing without validation, redirecting users based on returned URLs—a compromise of the third-party API becomes a compromise of your application. This vulnerability class became prominent after several high-profile supply chain attacks involving compromised API providers.

Remediation: Validate and sanitize all data received from external APIs. Treat third-party API responses as untrusted input. Implement circuit breakers for external dependencies. Monitor third-party API response patterns for anomalies.

How TigerGate's API Scanner Covers All 10 Categories

TigerGate's API Scanner supports REST, GraphQL, and SOAP APIs, running a comprehensive test suite against every endpoint. It does not rely solely on static analysis—it actively tests authorization logic, probes for injection vulnerabilities, measures rate limiting behavior, and fuzzes input fields to find real exploitable issues.

OWASP CategoryTigerGate Test ApproachCoverage
API1: BOLAObject ID enumeration, UUID brute force, cross-user data access testsActive
API2: Broken AuthToken replay, weak JWT algorithm tests, credential stuffing simulationActive
API3: Property AuthMass assignment probes, response field analysis for over-exposureActive
API4: Resource LimitsRate limit measurement, large payload injection, GraphQL depth attacksActive
API5: Function AuthHTTP method fuzzing, admin endpoint discovery, privilege escalation testsActive
API6: Business FlowsVelocity and rate limit checks on sensitive flowsPassive
API7: SSRFURL parameter injection with internal endpoint payloadsActive
API8: MisconfigurationCORS, security headers, HTTP methods, TLS configuration checksActive
API9: InventoryEndpoint discovery, version enumeration, undocumented path detectionActive
API10: Unsafe ConsumptionResponse validation checks, redirect analysisPassive

Testing Best Practices

  • Run API security scans against staging environments that mirror production data shapes, not just structure
  • Include authentication tokens in scan configuration so the scanner tests authenticated endpoints, not just unauthenticated ones
  • Schedule recurring API scans triggered by OpenAPI spec changes in CI/CD pipelines
  • Combine automated scanning with manual pentesting for business logic flaws (API6) that require domain knowledge
  • Review scanner findings in context of your specific authorization model—false positives for BOLA require understanding your object ownership rules

Scan Your APIs for All OWASP Top 10 Vulnerabilities

TigerGate's API Scanner actively tests REST, GraphQL, and SOAP APIs against every OWASP API Security Top 10 category. Get actionable findings with remediation guidance in minutes.