1
Broken Access Control
Critical
Restrictions on what authenticated users can do are not properly enforced. Attackers can exploit these flaws to access unauthorized functionality or data.
Example 1

Modifying the URL to access other users' resources

Example 2

Changing the 'id' parameter in the URL to view other users' data

Example 3

Accessing the API without proper authentication