API Security

Unveiling Top API Vulnerabilities and Emerging Trends: Introducing the Wallarm Q2 2024 API ThreatStats™ Report

As we move through 2024, the Wallarm Research Team continues to monitor the evolving API vulnerability and threat landscape. Our latest Q2 ThreatStats™ Report reveals critical trends and developments that are reshaping the security environment. Continuing from our Q1 findings, the surge in AI API vulnerabilities is not only persisting but intensifying, with an alarming increase in both the volume and severity of exploits. This quarter, we provide a deep dive into the most significant AI API exploits and examine the top API threat types that have emerged.

Key Insights from Q2 2024

The Growing Threat of AI API Attacks

As we highlighted in last quarter’s API ThreatStats™ Report, the integration of AI into various applications has brought new risks, with API attacks on AI systems accelerating at an unprecedented rate. The Q2 report reveals a threefold increase in vulnerabilities within well-known AI systems, highlighting the urgent need for enhanced security measures in this space. The rapid growth of AI APIs in the digital ecosystem has exposed organizations to new, often overlooked, risks. This is a trend that we believe will continue.

Mergers & Acquisitions: A New Security Frontier

One of the most surprising findings this quarter is the significant security risks introduced during mergers and acquisitions (M&A). The report details how ongoing M&A processes have exposed multiple organizations to considerable threats. Notable incidents include breaches at platforms like TestRail (Atlassian), HelloSign (Dropbox), Duo (Cisco), and Authy (Twilio). These cases underscore the critical importance of thorough security assessments and stringent protocols during M&A transitions.

Persistent Challenges with JSON Web Token (JWT) Misuse

Despite the widespread adoption of JWT for securing API communications, improper implementation continues to pose serious security challenges. This quarter, we identified several key issues, including:

  • A vulnerability in the Veeam Recovery Orchestrator, where a hard-coded JWT secret exposed a critical flaw, enabling attackers to forge tokens and gain unauthorized access.
  • An authentication bypass vulnerability in Lua-Resty.
  • A JWT bomb attack in Python-jose, exploiting the decode function to cause denial of service.

These findings illustrate the ongoing difficulties in properly implementing JWT, even as its use becomes more prevalent across industries.

Noteworthy Vulnerabilities and Breaches

The Q2, 2024 API ThreatStats™ Report also highlights several critical vulnerabilities in well-regarded platforms:

Grafana: Despite its strong security focus, Grafana was found to have multiple critical vulnerabilities this quarter, including issues that allowed outside organizations to delete snapshots using its key, a directory traversal flaw in .csv files, and several OAuth-related vulnerabilities, such as account takeovers and token leaks.

AI API Exploits: The AnythingLLM API was found to have vulnerabilities allowing arbitrary file deletion due to path traversal in the logo photo feature, and remote code execution via environmental variables. Additionally, ZenML had a directory traversal vulnerability that permitted unauthorized access to sensitive files.

These cases highlight that even platforms with a robust security posture aren’t immune to flaws, reinforcing the need for continuous monitoring and proactive security practices.

Actionable Steps to Enhance API Security

To help organizations strengthen their API security programs, the Q2 ThreatStats™ Report also provides actionable insights and recommendations. From assessing API risks to prioritizing fixes, these steps are designed to mitigate the risks posed by emerging threats and vulnerabilities.

Stay ahead of the curve by staying informed about the latest developments in the API threat landscape. As these trends continue to evolve, so too must our approaches to security, ensuring that our digital ecosystems remain resilient against ever-changing threats.

Please take a look at the report and let us know what you think.

Download the report here.

Recent Posts

The CISO’s Dilemma: How To Scale AI Securely

Your board wants AI. Your developers are building with it. Your budget committee is asking…

1 week ago

Agent-to-Agent Attacks Are Coming: What API Security Teaches Us About Securing AI Systems

AI systems are no longer just isolated models responding to human prompts.  In modern production…

1 week ago

Everyone Knows About Broken Authorization – So Why Does It Still Work for Attackers?

Broken authorization is one of the most widely known API vulnerabilities.  It features in the…

3 weeks ago

From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses

The shadow technology problem is getting worse.  Over the past few years, organizations have scaled…

1 month ago

Inside Modern API Attacks: What We Learn from the 2026 API ThreatStats Report

API security has been a growing concern for years. However, while it was always seen…

1 month ago

CISO Spotlight: Craig Riddell on Curiosity, Translation, and Why API Security is the New Business Imperative

It’s an unusually cold winter morning in Houston, and Craig Riddell is settling into his…

1 month ago