Unsafe API Consumption

Unsafe API Consumption occurs when an application or service interacts with APIs in a way that exposes it to vulnerabilities, such as not validating inputs or failing to handle sensitive data securely.

The below example is based on HTB's API Attacks module.

This flaw is present when an API consumes another API in an insecure manner, for instance, a 3rd party endpoint vulnerable to Excessive Data Exposure (Figure 1).

Figure 1: A vulnerable 3rd party endpoint.

Last updated

Was this helpful?