🎄 Join our Annual Holiday wargame and win prizes!


Broken Auth.api - Holiday 2025

08/01/2026

In modern APIs, authentication isn’t just about checking a username and password, it’s about establishing trust boundaries and enforcing them consistently.

Take a simple API design: login issues a token, protected routes enforce it. At first glance, everything seems correct. But right next to it sits a password reset endpoint that accepts an email and a new password, but returns success without any verification. No session, no token, no proof that the requester actually owns the account.

This is a textbook example of Broken Authentication, one of the most common and dangerous categories in the OWASP API Security Top 10 (API2:2023). Authentication endpoints like login, password reset, and account recovery are critical assets. If an attacker can bypass or manipulate them, they can take over accounts, read personal data, or perform actions on behalf of other users all while appearing legitimate to the system.

APIs become vulnerable when they:

  • Permit account recovery without verifying identity

  • Accept weak or predictable credentials Fail to validate the authenticity or expiration of tokens

  • Send sensitive authentication details in unsafe ways

  • Allow attackers to brute-force accounts without rate-limiting or lockouts

We made a challenge inspired by this vulnerability, it is available right now for free as part of our Holiday 7x7 Wargame.

Try the challenge yourself: :backhand_index_pointing_right: Play - SecDim

Deco line
Deco line

Play AppSec WarGames

Want to skill-up in secure coding and AppSec? Try SecDim Wargames to learn how to find, hack and fix security vulnerabilities inspired by real-world incidents.

Deco line
Deco line

Got a comment?

Join our secure coding and AppSec community. A discussion board to share and discuss all aspects of secure programming, AppSec, DevSecOps, fuzzing, cloudsec, AIsec code review, and more.

Read more