Web Security Academy alignment with the OWASP Top 10 API vulnerabilities
The OWASP Foundation periodically publishes a list of critical API-specific security risks. Although some of these risks have a different name in the context of APIs, many of them align with our existing Web Security Academy topics.
The table below specifies which Web Security Academy topics are relevant to the OWASP Top 10 API vulnerabilities:
Risk |
Relevant Web Security Academy topics |
Broken object level authorization |
|
Broken authentication |
Authentication vulnerabilities |
Broken object property level authorization |
|
Unrestricted resource consumption |
|
Broken function level authorization |
|
Unrestricted access to sensitive business flows |
|
Server side request forgery |
|
Security misconfiguration |
Cross-origin resource sharing (CORS) |
Improper inventory management |
|
Unsafe consumption of APIs |
You can read more about the OWASP API Top 10 on the OWASP website, at OWASP API Security Top 10 - 2023.