News

When APIs Become Attack Paths: What the Q3 2025 ThreatStats Report Tells Us

  • None--securityboulevard.com
  • published date: 2025-10-31 00:00:00 UTC

None

<p>Wallarm’s latest Q3 2025 API ThreatStats report [link placeholder] reveals that API vulnerabilities, exploits, and breaches are not just increasing; they’re evolving. </p><p>Malicious actors are shifting from code-level weaknesses to business logic flaws, from web apps to partner integrations, and from REST to AI-powered APIs.</p><div class="code-block code-block-13" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-13-1" data-info="WyIxMy0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="U2hvcnQ=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://www.techstrongevents.com/cruisecon-virtual-west-2025/home?ref=in-article-ad-2&amp;utm_source=sb&amp;utm_medium=referral&amp;utm_campaign=in-article-ad-2" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2025/10/Banner-770x330-social-1.png" alt="Cruise Con 2025"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><p>Here’s what stood out this quarter, and what security leaders should do about it.</p><figure class="wp-block-image size-full"><img data-recalc-dims="1" fetchpriority="high" decoding="async" width="770" height="578" src="https://i0.wp.com/lab.wallarm.com/wp-content/uploads/2025/10/Screenshot-2025-10-30-152254.png?resize=770%2C578&amp;ssl=1" alt="" class="wp-image-55182" srcset="https://i0.wp.com/lab.wallarm.com/wp-content/uploads/2025/10/Screenshot-2025-10-30-152254.png?w=1150&amp;ssl=1 1150w, https://i0.wp.com/lab.wallarm.com/wp-content/uploads/2025/10/Screenshot-2025-10-30-152254.png?resize=300%2C225&amp;ssl=1 300w, https://i0.wp.com/lab.wallarm.com/wp-content/uploads/2025/10/Screenshot-2025-10-30-152254.png?resize=768%2C576&amp;ssl=1 768w, https://i0.wp.com/lab.wallarm.com/wp-content/uploads/2025/10/Screenshot-2025-10-30-152254.png?resize=800%2C600&amp;ssl=1 800w, https://i0.wp.com/lab.wallarm.com/wp-content/uploads/2025/10/Screenshot-2025-10-30-152254.png?resize=600%2C450&amp;ssl=1 600w, https://i0.wp.com/lab.wallarm.com/wp-content/uploads/2025/10/Screenshot-2025-10-30-152254.png?resize=400%2C300&amp;ssl=1 400w, https://i0.wp.com/lab.wallarm.com/wp-content/uploads/2025/10/Screenshot-2025-10-30-152254.png?resize=200%2C150&amp;ssl=1 200w" sizes="(max-width: 770px) 100vw, 770px"></figure><h2 class="wp-block-heading">API Vulnerabilities Surge Again</h2><p>In Q3 2025, our researchers identified 1,602 API-related vulnerabilities, a 20% increase from Q2. The average severity held steady at a CVSS of 7.4, meaning most flaws remain High or Critical.</p><p>The culprits haven’t changed much:</p><ul class="wp-block-list"> <li>Security Misconfiguration (API8) once again topped the list with 605 cases, up 33% quarter over quarter.</li> <li>Broken Authorization (API5, API1) accounted for roughly 28% of all API vulnerabilities.</li> <li>Broken Authentication (API2) climbed sharply, driven by weak credential enforcement in REST and SOAP APIs.</li> </ul><p>Despite <a href="https://lab.wallarm.com/api-attack-awareness-when-authentication-fails-exposing-apis-to-risk/" rel="noreferrer noopener">greater awareness</a>, the same fundamental issues persist: misconfigurations, insufficient access control, and poor credential hygiene. Each points to the same systemic gap: APIs are still being deployed faster than they are secured.</p><h2 class="wp-block-heading">AI-API and MCP Vulnerabilities Are Exploding</h2><p>If there’s one unmistakable trend, it’s the rise of AI-API vulnerabilities.</p><p>In Q3, these grew from 77 to 121, a 57% increase in just three months. Within that group, Model Context Protocol (MCP) vulnerabilities spiked 270%, signaling that malefactors are quickly learning how to exploit model-serving and inference pipelines.</p><p>Most of these flaws map to familiar API weaknesses: misconfiguration, broken function-level authorization, and unsafe consumption of APIs. But the implications run deeper.</p><p>AI-API integrations don’t just expose data; they expose business logic, workflows, and trust chains. As entities embed AI across customer and partner interfaces, these attack surfaces multiply, and traditional API scanning alone can’t keep pace.</p><p>The takeaway: As we claimed in our 2025 Annual API ThreatStats report, <a href="https://lab.wallarm.com/api-security-dilemma-why-traditional-approaches-fail-ai-era/" rel="noreferrer noopener">AI security</a> is now API security. Any enterprise integrating model endpoints or agentic systems must extend its API protection stack to cover inference and orchestration layers.</p><h2 class="wp-block-heading">Exploited APIs Still Follow the Same Patterns</h2><p>The CISA Known Exploited Vulnerabilities (KEV) catalog added 51 new entries in Q3. Of those, 8 (16%) were API-related, showing that APIs remain a consistent portion of confirmed in-the-wild exploits.</p><p>These real-world attacks reflected the same old patterns:</p><ul class="wp-block-list"> <li>Broken Authorization in Cisco ISE and TeleMessage APIs enabled unauthorized access and remote code execution.</li> <li>Security Misconfiguration exposed diagnostic interfaces such as Spring Boot Actuator endpoints.</li> <li>Unsafe Consumption of APIs led to deserialization flaws in systems like Fortra GoAnywhere and DELMIA Apriso.</li> </ul><p>The overlap between vulnerabilities and active exploits is telling. The same classes of weaknesses keep being rediscovered, re-exploited, and remediated, often too late.</p><h2 class="wp-block-heading">Breaches Reveal Expanding Attack Chains</h2><p>Eight major API-related breaches were confirmed in Q3, spanning fintech, hospitality, SaaS, and AI. The numbers dipped slightly from Q2, but the scope and complexity increased.</p><p>The standout was the Salesloft / Drift OAuth incident, which used stolen tokens to compromise Salesforce APIs across multiple enterprises, including Cloudflare, Zscaler, Palo Alto Networks, and Google. It was a single exploit that rippled across entire partner ecosystems.</p><p>Other cases worth mentioning include:</p><ul class="wp-block-list"> <li><strong>Restaurant Brands International (RBI): </strong>drive-thru and ordering APIs exploited through logic flaws and <a href="https://lab.wallarm.com/api-attack-awareness-broken-object-level-authorization-bola-why-it-tops-the-owasp-api-top-10/" rel="noreferrer noopener">broken object-level authorization</a> (BOLA).</li> <li><strong>SwissBorg:</strong> $41M lost through fintech API abuse.</li> <li><strong>McDonald’s (via Paradox.ai):</strong> internal chatbot APIs exposed sensitive applicant and HR data.</li> <li><strong>Flexypay Solutions:</strong> fraudulent partner API calls triggered unauthorized payouts.</li> </ul><p>The common thread is that bad actors are doing more than probing APIs for injection flaws, they’re manipulating workflows, tokens, and trust boundaries.</p><h2 class="wp-block-heading">The Rise of Business Logic Abuse</h2><p>Among all findings, the report highlights one trend every CISO should note: Business Logic Abuse (BLA).</p><p>Unlike SQL injection or XSS, BLA doesn’t exploit coding errors; it abuses the way an application is designed to work. Attackers skip steps, repeat one-time actions, or twist state transitions to gain unauthorized outcomes.</p><p>Examples include:</p><ul class="wp-block-list"> <li>Reusing coupons or refunds that should expire (Action Limit Overrun)</li> <li>Skipping workflow validation steps (Missing Transition Validation)</li> <li>Abusing hidden or legacy API functions (Shadow Function Abuse)</li> </ul><p>The <a href="https://www.wallarm.com/webinars/when-secure-isnt-safe-uncovering-owasp-top-10-business-logic-abuse?r=092025" rel="noreferrer noopener">OWASP Business Logic Abuse Top 10</a>, released this year, formalizes this growing class of attacks. And with 82% of businesses now describing themselves as API-first, the logic layer has become a lucrative new target.</p><figure class="wp-block-image size-full"><img data-recalc-dims="1" decoding="async" width="770" height="720" src="https://i0.wp.com/lab.wallarm.com/wp-content/uploads/2025/10/Screenshot-2025-10-30-143409.png?resize=770%2C720&amp;ssl=1" alt="" class="wp-image-55169" srcset="https://i0.wp.com/lab.wallarm.com/wp-content/uploads/2025/10/Screenshot-2025-10-30-143409.png?w=1038&amp;ssl=1 1038w, https://i0.wp.com/lab.wallarm.com/wp-content/uploads/2025/10/Screenshot-2025-10-30-143409.png?resize=300%2C280&amp;ssl=1 300w, https://i0.wp.com/lab.wallarm.com/wp-content/uploads/2025/10/Screenshot-2025-10-30-143409.png?resize=768%2C718&amp;ssl=1 768w" sizes="(max-width: 770px) 100vw, 770px"></figure><p>Traditional WAFs and static scanners can’t catch this. Only stateful, behavior-aware monitoring and context-driven testing can detect BLA in real time.</p><h2 class="wp-block-heading">Key Takeaways for Security Leaders</h2><p>Q3 confirms that API risk is outpacing traditional AppSec coverage. Misconfigurations and authorization failures remain endemic, AI integrations are accelerating, and logic abuse has entered the mainstream. The gap between awareness and execution is widening.</p><p>So where should firms focus next?</p><h3 class="wp-block-heading">Make API Security a First-Class Citizen</h3><p>APIs now represent your primary attack surface. Treat them that way. Integrate API metrics (inventory coverage, exposure rates, mean time to detect) into your board-level dashboards.</p><h3 class="wp-block-heading">Bridge the AppSec Divide</h3><p>Web, mobile, and API security are no longer separate domains. Unify governance and testing under one framework so that every new service is secure from design through deployment.</p><h3 class="wp-block-heading">Extend Protection to AI Pipelines</h3><p>AI endpoints must be monitored like privileged systems. Instrument model APIs, log inference traffic, and audit integrations quarterly. Agentic systems require the same (or greater) rigor as customer-facing APIs.</p><h3 class="wp-block-heading">Hunt Shadow APIs</h3><p>Discovery isn’t enough. Use active scanning and traffic correlation to uncover unregistered endpoints, debug paths, and staging leftovers before attackers do. </p><h3 class="wp-block-heading">Test Business Logic, Not Just Code</h3><p>Automate abuse simulations in CI/CD. Check for role escalation, skipped workflows, and token replay. If your QA process ends with schema validation, you’re not testing security, just syntax.</p><h2 class="wp-block-heading">API Security Leads AppSec</h2><p>The Q3 2025 API ThreatStats report paints a picture of API sprawl, AI integration, and business logic flaws converging into a systemic risk.</p><p>Attackers are evolving faster than defenses. The question isn’t whether APIs will be targeted; it’s whether entities can see and stop the attacks before they cascade across connected ecosystems.</p><p>API security can no longer sit behind AppSec. It has to lead it. For the full insights, <a href="https://www.wallarm.com/reports/q3-2025-wallarm-api-threatstats-report" rel="noreferrer noopener">download the report today</a>.</p><p>The post <a href="https://lab.wallarm.com/when-apis-become-attack-paths-q3-2025-threatstats-report/">When APIs Become Attack Paths: What the Q3 2025 ThreatStats Report Tells Us</a> appeared first on <a href="https://lab.wallarm.com/">Wallarm</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/10/when-apis-become-attack-paths-what-the-q3-2025-threatstats-report-tells-us/" data-a2a-title="When APIs Become Attack Paths: What the Q3 2025 ThreatStats Report Tells Us"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F10%2Fwhen-apis-become-attack-paths-what-the-q3-2025-threatstats-report-tells-us%2F&amp;linkname=When%20APIs%20Become%20Attack%20Paths%3A%20What%20the%20Q3%202025%20ThreatStats%20Report%20Tells%20Us" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F10%2Fwhen-apis-become-attack-paths-what-the-q3-2025-threatstats-report-tells-us%2F&amp;linkname=When%20APIs%20Become%20Attack%20Paths%3A%20What%20the%20Q3%202025%20ThreatStats%20Report%20Tells%20Us" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F10%2Fwhen-apis-become-attack-paths-what-the-q3-2025-threatstats-report-tells-us%2F&amp;linkname=When%20APIs%20Become%20Attack%20Paths%3A%20What%20the%20Q3%202025%20ThreatStats%20Report%20Tells%20Us" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F10%2Fwhen-apis-become-attack-paths-what-the-q3-2025-threatstats-report-tells-us%2F&amp;linkname=When%20APIs%20Become%20Attack%20Paths%3A%20What%20the%20Q3%202025%20ThreatStats%20Report%20Tells%20Us" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F10%2Fwhen-apis-become-attack-paths-what-the-q3-2025-threatstats-report-tells-us%2F&amp;linkname=When%20APIs%20Become%20Attack%20Paths%3A%20What%20the%20Q3%202025%20ThreatStats%20Report%20Tells%20Us" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://lab.wallarm.com/">Wallarm</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Tim Erlin">Tim Erlin</a>. Read the original post at: <a href="https://lab.wallarm.com/when-apis-become-attack-paths-q3-2025-threatstats-report/">https://lab.wallarm.com/when-apis-become-attack-paths-q3-2025-threatstats-report/</a> </p>