Missing Authentication with Api Keys
How Missing Authentication Manifests in Api Keys
Missing authentication in Api Keys implementations creates critical security gaps where unauthorized users can access protected resources. The most common manifestation occurs when API endpoints accept keys but fail to validate them properly. This happens when developers assume keys are present without verifying their existence or legitimacy.
A typical vulnerability appears in endpoint handlers where key extraction happens without validation:
Related CWEs: authentication
CWE ID Name Severity CWE-287 Improper Authentication CRITICAL CWE-306 Missing Authentication for Critical Function CRITICAL CWE-307 Brute Force HIGH CWE-308 Single-Factor Authentication MEDIUM CWE-309 Use of Password System for Primary Authentication MEDIUM CWE-347 Improper Verification of Cryptographic Signature HIGH CWE-384 Session Fixation HIGH CWE-521 Weak Password Requirements MEDIUM CWE-613 Insufficient Session Expiration MEDIUM CWE-640 Weak Password Recovery HIGH