Missing Authentication with Api Keys

How Missing Authentication Manifests in Api Keys

Missing authentication in Api Keys implementations creates critical security gaps where unauthorized users can access protected resources. The most common manifestation occurs when API endpoints accept keys but fail to validate them properly. This happens when developers assume keys are present without verifying their existence or legitimacy.

A typical vulnerability appears in endpoint handlers where key extraction happens without validation:

 

Related CWEs: authentication

CWE IDNameSeverity
CWE-287Improper Authentication CRITICAL
CWE-306Missing Authentication for Critical Function CRITICAL
CWE-307Brute Force HIGH
CWE-308Single-Factor Authentication MEDIUM
CWE-309Use of Password System for Primary Authentication MEDIUM
CWE-347Improper Verification of Cryptographic Signature HIGH
CWE-384Session Fixation HIGH
CWE-521Weak Password Requirements MEDIUM
CWE-613Insufficient Session Expiration MEDIUM
CWE-640Weak Password Recovery HIGH