18.9% of API-related exploits involved legacy APIs, including AJAX backends and URL parameter-based systems.
18.9% of API-related exploits involved legacy APIs, including AJAX backends and URL parameter-based systems. — This cybersecurity statistic was published by Wallarm in January 2025. It covers topics including API, Legacy Systems, Exploits, Security. The original data appears in 2025 API ThreatStats Report. For the full methodology and detailed findings, refer to the original report.
Share or Copy this stat
Frequently Asked Questions
What does this statistic say?
18.9% of API-related exploits involved legacy APIs, including AJAX backends and URL parameter-based systems. This data was published by Wallarm and covers API, Legacy Systems, Exploits, Security.
Where does this data come from?
This statistic comes from 2025 API ThreatStats Report, published by Wallarm on January 1, 2025. You can view the original report at Wallarm Annual 2025 API ThreatStats Report.
What cybersecurity topics does this cover?
This statistic relates to API, Legacy Systems, Exploits, Security. Browse more statistics on API or from Wallarm.