appsec.fyi

API Security Resources

Post Share

A curated AppSec resource library covering XSS, SQLi, SSRF, IDOR, RCE, XXE, OSINT, and more.

API Security

API security addresses the unique vulnerabilities that arise when applications expose functionality through programmatic interfaces. As organizations shift to API-first architectures, microservices, and third-party integrations, APIs have become the primary attack surface for modern applications. The OWASP API Security Top 10 identifies critical risks including Broken Object Level Authorization (BOLA), mass assignment, excessive data exposure, and lack of rate limiting. APIs often inadvertently expose more data than their UI counterparts, accept parameters that bypass frontend validation, and may lack the authentication and authorization checks that browser-based interfaces enforce. REST, GraphQL, gRPC, and WebSocket APIs each present distinct security challenges. Effective API security requires authentication hardening, input validation, output filtering, rate limiting, proper error handling, and comprehensive logging across every endpoint.

Date Added Link Excerpt
2026-05-12 NEW 2026JetBrains TeamCity vulnerability allows privilege escalation API exposure (CVE-2026-44413) newsJetBrains TeamCity vulnerability allows privilege escalation, API exposure (CVE-2026-44413) https://ift.tt/lMRi9Fd → helpnetsecurity.com
2026-05-12 NEW 2026OpenAI Introduces Daybreak: A Cybersecurity Initiative That Puts Codex Security at the Center of Vulnerability Detection and Patch Validation beginnerOpenAI has launched Daybreak, a new cybersecurity initiative focused on enhancing the security of its Codex code model. Daybreak aims to proactively identify and address vulnerabilities within Codex by leveraging AI-powered security tools. The program emphasizes both the detection of existing security flaws and the validation of patches to ensure their effectiveness. This initiative signifies OpenAI's commitment to robust AI security practices.
2026-05-11 NEW 2026Ollama Vulnerability Exposes Remote Process Memory newsWriteup of CVE-2026-7482, "Bleeding Llama," a critical heap out-of-bounds read in Ollama's GGUF model loader. This vulnerability allows for the leakage of process memory, including API keys and user conversation data, through the `/api/create` and `/api/push` endpoints, especially when Ollama is configured to bind to `0.0.0.0`. Versions prior to 0.17.1 are affected, with remediation involving an immediate upgrade and auditing of network-exposed instances. → letsdatascience.com
2026-05-10 NEW 2026Ollama contains critical GGUF out-of-bounds read newsWriteup on CVE-2026-7482 details a critical heap out-of-bounds read in Ollama's GGUF model loader, affecting versions before 0.17.1. Exploitable via the unauthenticated /api/create endpoint with a crafted GGUF file, the vulnerability allows reading past allocated heap buffers, potentially leaking environment variables, API keys, and user data. This leaked data can be exfiltrated using the /api/push endpoint. Roughly 300,000 Ollama deployments are estimated to be publicly reachable, increasing the attack surface. → letsdatascience.com
2026-05-10 NEW 2026Ollama Out-of-Bounds Read Vulnerability Allows Remote Process Memory Leak newsLibrary detailing CVE-2026-7482, a critical out-of-bounds read vulnerability in Ollama's GGUF model loader that allows remote attackers to leak process memory, potentially exposing API keys and user data. It also covers two unpatched Windows vulnerabilities, CVE-2026-42248 (missing signature verification) and CVE-2026-42249 (path traversal), which can be chained for persistent code execution by influencing update responses. → thehackernews.com
2026-05-09 NEW 2026Critical Ollama Memory Leak Vulnerability Exposes 300000 Servers Globally newsA critical memory leak vulnerability in Ollama, an open-source tool for running large language models, has been discovered, potentially impacting an estimated 300,000 servers worldwide. The vulnerability allows for denial-of-service (DoS) attacks by exhausting server memory. While the exact payout amount for reporting this bug isn't specified, the discovery highlights a significant security risk for users of Ollama, emphasizing the need for prompt patching and security awareness in the AI infrastructure landscape. → cybersecuritynews.com
2026-05-09 NEW 2026New ZiChatBot Malware Uses Zulip REST APIs as Command and Control Server newsLibrary for detecting the ZiChatBot malware, which exploits Zulip REST APIs for command and control. This cross-platform malware, identified by Securelist and linked to the OceanLotus APT group (APT32), was distributed via malicious Python packages on PyPI, including fake libraries like uuid32-utils, colorinal, and termncolor. ZiChatBot uses two channel-topic pairs within Zulip to exfiltrate system information and receive shellcode commands, with execution confirmed by a heart emoji response. The dropper employs AES encryption and self-deletion for stealth.
2026-05-07 NEW 2026Ollama vulnerability highlights danger of AI frameworks with unrestricted access newsLibrary for running AI models on local hardware, Ollama, suffers from CVE-2026-7482, dubbed Bleeding Llama. This vulnerability, an out-of-bounds heap read in the model quantization pipeline, allows unauthenticated attackers to craft malicious GGUF files. Uploading these files via the API endpoint triggers a leak of sensitive process memory, including system prompts, user messages, environment variables, API keys, and proprietary code. Exploitation requires only three API requests to exfiltrate this data. Mitigation involves updating to Ollama version 0.17.1, using authentication proxies, and implementing IP access filters and firewalls. → csoonline.com
2026-05-07 NEW 2026API Security Operations: How to Move from Visibility to Measurable Risk Reduction beginnerThis article, "API Security Operations: How to Move from Visibility to Measurable Risk Reduction," discusses the transition from simply identifying API security vulnerabilities to actively reducing measurable risk. It likely outlines strategies and best practices for organizations to enhance their API security posture. The core message centers on moving beyond basic detection to implementing proactive measures that demonstrably improve security and minimize potential threats. The provided link points to further details on this topic. No specific bounty payout amount is mentioned. → securityboulevard.com
2026-05-07 NEW 2026Critical Argo CD Vulnerability Enables Kubernetes Secret Extraction newsA critical vulnerability has been discovered in Argo CD, a popular continuous delivery tool for Kubernetes. This security flaw allows attackers to potentially extract sensitive Kubernetes secrets. The vulnerability, detailed in a recent security advisory, highlights a significant risk for organizations using Argo CD. The exact payout for reporting this bug has not been publicly disclosed. → cyberpress.org
2026-05-06 NEW 2026Major AI platform Ollama critically leaking: 300000 servers exposed to hackers newsOllama, a popular AI platform, is critically vulnerable, exposing approximately 300,000 servers to potential hacking. This significant security lapse could allow unauthorized access to sensitive data and systems running on these servers. The extent of the breach and the specific nature of the leak are still under investigation, but the large number of affected servers highlights a major security concern within the AI infrastructure. Further details on remediation and the exact impact are expected as the situation develops. → cybernews.com
2026-05-06 NEW 2026Argo CD's ServerSideDiff Vulnerability Enables Kubernetes Secret Extraction newsArgo CD's ServerSideDiff vulnerability allows attackers to extract sensitive Kubernetes secrets. This flaw enables the unauthorized disclosure of confidential information stored within the cluster. The vulnerability arises from how Argo CD handles diffing operations on the server side, creating an exploitable condition. This discovery highlights a significant security risk for users of Argo CD and emphasizes the need for prompt patching and security audits. → cybersecuritynews.com
2026-05-06 NEW 2026Zero-Auth Flaw Exposes DoD Contractor to Cross-Tenant Data Access news AuthZA significant zero-authentication vulnerability has been discovered in a contractor serving the Department of Defense (DoD). This flaw, if exploited, could allow attackers to gain unauthorized access to sensitive data across different tenants. The discovery highlights a critical security gap, potentially exposing confidential information. Further details on the exploit and its full impact are still emerging, but the exposure of DoD contractor data is a serious concern. → cybersecuritynews.com
2026-05-06 NEW 2026Palo Alto Networks PAN-OS flaw exploited for remote code execution news RCEWriteup of CVE-2026-0030, a critical PAN-OS buffer overflow vulnerability exploited for unauthenticated remote code execution with root privileges. The flaw primarily targets PA-Series and VM-Series firewalls where the User-ID Authentication Portal is exposed to the internet. Palo Alto Networks advises restricting access to trusted internal IP addresses to mitigate this risk, noting limited exploitation has been observed. Fixes are anticipated by May 13, 2026. → securityaffairs.com
2026-05-06 NEW 2026Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution news RCEWriteup on CVE-2026-0300, a critical buffer overflow vulnerability in Palo Alto Networks' PAN-OS software, enabling unauthenticated remote code execution with root privileges. This flaw, exploitable via specially crafted packets and impacting specific versions of PAN-OS, has seen limited exploitation in the wild, primarily targeting publicly accessible User-ID Authentication Portals on PA-Series and VM-Series firewalls. Fixes are planned, with interim mitigation strategies including restricting or disabling the User-ID Authentication Portal. → thehackernews.com
2026-05-06 NEW 2026n8n: From Parsing Bug to Remote Code Execution aka CVE-2026-42231 news RCEWriteup detailing CVE-2026-42231 in n8n, a node-based workflow automation tool. This vulnerability chain exploits a prototype pollution primitive within the xml2js XML parsing library, stemming from semantic quirks in its CoffeeScript origins. The research demonstrates how this seemingly low-severity bug, when combined with specific gadget chains in n8n's internal modules like `@n8n/node-cli`, can escalate to unauthenticated remote code execution, bypassing previous mitigations against `spawn` exploitation.
2026-05-05 NEW 2026Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API news RCEWeaver E-cology RCE Flaw CVE-2026-22679 is being actively exploited through its debug API. This vulnerability allows for remote code execution, meaning attackers can potentially run arbitrary code on affected systems. The exploit leverages a weakness in the debug functionality, making it a critical security concern for organizations using Weaver E-cology. Further details on the exploit and mitigation strategies are available via the provided link. → thehackernews.com
2026-05-02 2026Cursor AI Flaw Lets Hackers Steal API Keys and Run Code Silently news RCE SecretsLibrary for securing AI-powered development tools, addressing critical flaws in Cursor AI that allow attackers to steal API keys and session tokens via unencrypted SQLite databases. Vulnerabilities, including CursorJacking, stem from poor credential storage and weak extension isolation, enabling malicious extensions to exfiltrate sensitive data silently. Additionally, CVE-2026-26268 details how the AI agent can execute code through Git hooks in untrusted repositories, bypassing user awareness.
2026-05-01 2026CVE-2026-42208: Pre-Authentication SQL Injection in LiteLLM Exposes API Credentials news SQLiA critical pre-authentication SQL injection vulnerability, CVE-2026-42208, has been discovered in LiteLLM. This flaw allows attackers to bypass authentication and execute arbitrary SQL commands. The vulnerability can be exploited to steal sensitive information, including API credentials, potentially leading to unauthorized access and misuse of services. The impact is significant as it affects the security of systems relying on LiteLLM for API management. Further details and mitigation strategies are available via the provided link. → securityboulevard.com
2026-04-30 2026Google Gemini CLI Vulnerabilities Allow Attackers to Execute Commands on Host Systems news RCEVulnerabilities in the Google Gemini CLI allow attackers to execute arbitrary commands on host systems. These flaws could enable malicious actors to compromise user machines by exploiting the CLI's interaction with local files and commands. The exact impact and exploitability depend on how users interact with the Gemini CLI and its configuration. → cybersecuritynews.com
2026-04-30 2026Qinglong Task Scheduler RCE Vulnerabilities Exploited in the Wild news RCEQinglong Task Scheduler is experiencing active exploitation of Remote Code Execution (RCE) vulnerabilities in the wild. This means attackers are successfully compromising systems by leveraging these weaknesses to execute arbitrary code. The nature of these vulnerabilities suggests a significant security risk for users of Qinglong Task Scheduler. Further details on the specific vulnerabilities and exploitation methods can be found at the provided link. → cybersecuritynews.com
2026-04-30 2026CVE MCP Server Turns Claude Into a Full-Spectrum Security Analyst With 27 Tools Across 21 APIs news AIThe CVE MCP Server transforms Claude, an AI model, into a comprehensive security analyst. It integrates 27 security tools via 21 APIs, allowing Claude to perform a wide range of security analysis tasks. This development significantly enhances Claude's capabilities in cybersecurity by providing it with access to diverse and powerful security functionalities. → cybersecuritynews.com
2026-04-29 2026Cursor Vulnerability Exposes Developer API Tokens newsA security vulnerability in Cursor has been disclosed, potentially exposing developer API tokens. The vulnerability, detailed in a linked article, raises concerns about the security of sensitive credentials used by developers on the platform. Specific details on the vulnerability's nature and impact, or any associated bug bounty payout, are not provided in the given content. → letsdatascience.com
2026-04-29 2026SLOTAGENT Malware Hides API Calls and Strings to Thwart Analysis intermediateSLOTAGENT, a new malware variant, employs sophisticated techniques to evade detection and analysis. It meticulously hides its API calls and critical strings, making it difficult for security researchers to understand its functionalities. This obfuscation aims to hinder malware analysis and delay the development of effective countermeasures. The specific payout amount for any bug bounty related to SLOTAGENT is not mentioned in the provided content. → gbhackers.com
2026-04-28 2026ClickUp is leaking customer data via hardcoded API key researcher claims news SecretsA security researcher claims that ClickUp is leaking customer data due to a hardcoded API key. This vulnerability could potentially expose sensitive information belonging to ClickUp users. The specifics of the data leak and its extent are not detailed in the provided content. → cybernews.com
2026-04-28 2026ClickUp Hardcoded API Key Exposes 959 Emails from Fortune 500 Giants news SecretsA hardcoded API key in ClickUp, a popular project management tool, led to the exposure of 959 emails belonging to employees of Fortune 500 companies. The vulnerability allowed unauthorized access to this sensitive information. The report does not mention a specific bug bounty payout amount. → cyberpress.org
2026-04-28 2026LiteLLM Contains Critical SQL Injection Vulnerability intermediate SQLiLiteLLM, a library simplifying API calls to LLMs, has a critical SQL injection vulnerability. This flaw allows attackers to execute arbitrary SQL queries, potentially leading to data breaches, unauthorized access, or system compromise. The vulnerability arises from improper sanitization of user-supplied input within the library's database interaction logic. Users are strongly advised to update LiteLLM to the latest version to patch this critical security flaw and protect their systems. No specific bounty payout amount was mentioned. → letsdatascience.com
2026-04-28 2026ClickUp Security Flaw Exposes 959 Emails Linked to Major Fortune 500 Firms newsA security flaw in the project management tool ClickUp has potentially exposed 959 emails associated with employees of major Fortune 500 companies. The vulnerability allowed unauthorized access to this sensitive information, raising concerns about data privacy and security for these large corporations. Details on the specific nature of the flaw or any disclosed payout amounts were not provided in the summary. → gbhackers.com
2026-04-27 2026Multiple OpenClaw Vulnerabilities Enable Policy Bypass and Host Override Attacks intermediateThis article details multiple vulnerabilities found in OpenClaw that allow attackers to bypass security policies and gain host override control. These critical flaws could significantly compromise systems relying on OpenClaw for security. The specific impact and potential attack vectors are discussed, highlighting the severity of these issues. → cyberpress.org
2026-04-23 2026New LMDeploy Vulnerability Exploited in the Wild Just 12 Hours After Public Advisory newsNew LMDeploy Vulnerability Exploited in the Wild Just 12 Hours After Public Advisory https://ift.tt/txmoBfy → cyberpress.org
2026-04-23 2026wapiti-scanner/wapiti: Web vulnerability scanner written in Python3 beginner PythonLibrary for black-box web vulnerability scanning. Wapiti works by fuzzing web applications, sending payloads, and analyzing responses for vulnerabilities such as SQL Injection, XSS, File Disclosure, XXE, CRLF Injection, Shellshock, SSRF, Open Redirects, and Log4Shell (CVE-2021-44228) and Spring4Shell (CVE-2020-5398) detection. It supports proxy configuration, HTTP authentication, session management, and generates reports in HTML, XML, JSON, TXT, and CSV formats. The library can also fingerprint web technologies using Wappalyzer and enumerate CMS modules for platforms like WordPress.
2026-04-23 2026Microsoft issues out-of-band patch for critical security flaw in update to ASP.NET Core newsLibrary update CVE-2026-40372 introduces a critical flaw in ASP.NET Core's Data Protection Library on Linux, macOS, and Windows. A bug in the .NET 10.0.6 package causes incorrect HMAC validation, allowing attackers to forge payloads and decrypt protected tokens and cookies. This requires rebuilding embedded applications, expiring affected tokens, and rotating credentials. → csoonline.com
2026-04-22 2026Microsoft releases emergency patches for critical ASP.NET flaw newsLibrary updates address critical ASP.NET Core privilege escalation vulnerability (CVE-2026-40372) in Data Protection cryptographic APIs. This flaw allows unauthenticated attackers to forge authentication cookies, potentially gaining SYSTEM privileges, disclosing files, and modifying data. The regression impacts Microsoft.AspNetCore.DataProtection NuGet packages from 10.0.0-10.0.6. Updates to 10.0.7 are recommended, followed by key ring rotation for full remediation. Previously, Microsoft patched an HTTP request smuggling bug (CVE-2025-55315) in the Kestrel web server. → bleepingcomputer.com
2026-04-22 2026A Deep Dive on the Most Critical API Vulnerability: BOLA intermediateA Deep Dive on the Most Critical API Vulnerability: BOLA
2026-04-22 2026What Is Broken Object Property Level Authorization? beginnerGuide to Broken Object Property Level Authorization, ranked third on OWASP's API Security Top 10 for 2023, details how APIs often fail to restrict access to individual data fields within objects. It covers how this vulnerability manifests in REST and GraphQL APIs, its business impact, and methods for implementing granular property-level access controls to prevent unauthorized reading and modification of sensitive data like internal identifiers or account status. → paloaltonetworks.com
2026-04-22 2026What Is Broken Object Level Authorization? beginnerReference detailing Broken Object Level Authorization (BOLA), the top API security risk according to OWASP. This vulnerability arises when APIs fail to properly validate object permissions after function-level access is granted, allowing attackers to manipulate object identifiers within requests, such as direct object references in RESTful APIs, to access unauthorized data. The resource contrasts BOLA with Broken Function Level Authorization (BFLA), emphasizing that BOLA exploits parameter manipulation within authorized endpoints, not privilege escalation. → paloaltonetworks.com
2026-04-22 2026This Is How I Hacked an API Using Mass Assignment Vulnerability intermediateWriteup detailing a silent privilege escalation via mass assignment in a REST API. The author demonstrates how trusting client-supplied JSON in profile update endpoints, where the backend blindly maps request fields to models without an allowlist, can lead to attackers silently gaining administrative privileges. This is achieved by "over-posting" extra fields like "role" or boolean flags, such as "is_admin", which the API then updates, effectively bypassing authorization. The writeup highlights common locations for this vulnerability, including profile updates, registration, and admin edit endpoints, and stresses the importance of explicit field allowlisting and using separate DTOs to prevent such flaws.
2026-04-22 2026CVE-2026-34839: CORS Vulnerability in Glances REST API newsCVE-2026-34839: CORS Vulnerability in Glances REST API
2026-04-22 2026API ThreatStats Report 2026 newsAPI ThreatStats Report 2026
2026-04-22 2026VAmPI: Vulnerable REST API with OWASP Top 10 Vulnerabilities beginnerLibrary implementing OWASP Top 10 API vulnerabilities, including SQLi, unauthorized password change, broken object level authorization, mass assignment, excessive data exposure, user and password enumeration, RegexDOS, lack of resources and rate limiting, and JWT authentication bypass. VAmPI is built with Flask, offers a global switch to enable or disable vulnerabilities, and includes OpenAPI 3 specs and a Postman collection for testing and learning purposes. It can be run locally via Python or Docker.
2026-04-22 2026API4:2023 Unrestricted Resource Consumption beginnerAPI4:2023 Unrestricted Resource Consumption
2026-04-22 20261H 2026 State of AI and API Security Report (Salt) news1H 2026 State of AI and API Security Report (Salt)
2026-04-22 2026PortSwigger Lab: Exploiting a Mass Assignment Vulnerability intermediateLab walkthrough demonstrating exploitation of a mass assignment vulnerability to purchase a product. The lab involves logging in with `wiener:peter`, adding an item to the basket, and then identifying and manipulating a `chosen_discount` parameter within the `/api/checkout` POST request. By adding this hidden parameter and altering its value, users can bypass credit limitations and solve the exercise. → portswigger.net
2026-04-21 2026Lovable left thousands of projects exposed for 48 days and the vibe coding security crisis is only getting worse newsLibrary for detecting vulnerabilities in AI-generated code, specifically addressing issues found in "vibe coding" platforms like Lovable. It highlights common flaws such as broken object-level authorization, exposed database credentials, and AI hallucination-related vulnerabilities, noting that 40-62% of AI-generated code contains security flaws and that market incentives often prioritize growth over security in this rapidly expanding field.
2026-04-21 2026Lovable AI App Builder Reportedly Exposes Thousands of Project Data via API Flaw newsLovable AI App Builder Reportedly Exposes Thousands of Project Data via API Flaw https://ift.tt/rUbhJN8 → cyberpress.org
2026-04-21 2026Vibe coding upstart Lovable denies data leak cites 'intentional behavior' then throws HackerOne under the bus newsWriteup detailing a Broken Object Level Authorization (BOLA) vulnerability exploited by an OSINT researcher against Vibe coding platform Lovable. The vulnerability allowed unauthorized access to sensitive user data, including credentials, chat history, and source code, via publicly accessible projects. Lovable's initial response attributed the exposure to "intentional behavior" and unclear documentation before blaming bug bounty platform HackerOne for mishandling the researcher's report. → theregister.com
2026-04-21 2026Lovables API flaw exposed private project data from the $6.6 billion AI app builder used by Nvidia and Microsoft teams newsAnalysis of a Lovable API vulnerability that exposed chat histories, source code, and Supabase API keys from projects created before November 2025. The flaw, reported via HackerOne in March 2026, stemmed from missing ownership checks on API endpoints, allowing any authenticated user to access data from older projects, impacting users at companies like Nvidia and Microsoft. Affected users are advised to rotate all credentials used within the platform.
2026-04-21 2026Lovable AI App Builder Hit by Reported API Flaw Exposing Thousands of Projects newsLovable AI App Builder Hit by Reported API Flaw Exposing Thousands of Projects https://ift.tt/asxTLXh → gbhackers.com
2026-04-21 2026Lovable Left Thousands of Projects Exposed for 48 Days And Still Hasn't Fixed It newsWriteup of BOLA vulnerability in Lovable.dev API exposing source code, database credentials, and AI chat histories. The flaw, affecting projects created before November 2025, allows free account users to access sensitive data from other users. This vulnerability, reported on HackerOne, highlights systemic security issues in AI-assisted development platforms, similar to the recent Vercel incident linked to Context.ai. Lovable has addressed chat history exposure but maintains source code visibility on public projects is intentional.
2026-04-21 2026API Security Risks Rise as AI Adoption Accelerates beginnerSurvey of API security risks stemming from AI adoption, revealing that 49% of organizations struggle to monitor machine-to-machine traffic and 48% cannot distinguish AI agents from bots. The report highlights amplified vulnerabilities like broken object-level authorization (BOLA) and challenges with AI-generated code security, noting traditional SAST and DAST tools are insufficient. Attackers increasingly target authenticated access, with 99% of attempts originating from such entities, underscoring the need for continuous verification and behavioral monitoring. → esecurityplanet.com

Frequently Asked Questions

What is the OWASP API Security Top 10?
The OWASP API Security Top 10 is a list of the most critical API security risks, including Broken Object Level Authorization (BOLA), Broken Authentication, Broken Object Property Level Authorization, Unrestricted Resource Consumption, Broken Function Level Authorization, Server Side Request Forgery, Security Misconfiguration, and Lack of Protection from Automated Threats.
Why are APIs harder to secure than web applications?
APIs often expose more data and functionality than web UIs, accept complex input formats, lack the natural access controls of a browser interface, and are harder to monitor. They also tend to grow organically, creating shadow APIs that bypass security controls, and their machine-to-machine nature makes abuse detection more difficult.
What tools are used for API security testing?
Common tools include Burp Suite with API-focused extensions, Postman for manual testing, OWASP ZAP for automated scanning, Akto for API inventory and testing, and custom scripts for fuzzing API parameters. For GraphQL APIs, InQL and graphql-cop are essential. API specification files (OpenAPI/Swagger) are valuable for understanding and testing the full attack surface.

Weekly AppSec Digest

Get new resources delivered every Monday.