Skip to main content
Back to Home

77.4% of API-related vulnerabilities in AI products are directly API-related, such as weak API authentication, inadequate rate limiting, and broken access controls.

January 1, 2025

77.4% of API-related vulnerabilities in AI products are directly API-related, such as weak API authentication, inadequate rate limiting, and broken access controls. — This cybersecurity statistic was published by Wallarm in January 2025. It covers topics including Wallarm, AI, API, Vulnerability, Authentication. The original data appears in 2025 API ThreatStats Report. For the full methodology and detailed findings, refer to the original report.

Source

View Original Report

Published on 1/1/2025

Share or Copy this stat

Frequently Asked Questions

What does this statistic say?

77.4% of API-related vulnerabilities in AI products are directly API-related, such as weak API authentication, inadequate rate limiting, and broken access controls. This data was published by Wallarm and covers Wallarm, AI, API, Vulnerability, Authentication.

Where does this data come from?

This statistic comes from 2025 API ThreatStats Report, published by Wallarm on January 1, 2025. You can view the original report at Wallarm Annual 2025 API ThreatStats Report.

What cybersecurity topics does this cover?

This statistic relates to Wallarm, AI, API, Vulnerability, Authentication. Browse more statistics on Wallarm or from Wallarm.

Want More Statistics Like This?

Get the latest cybersecurity stats delivered to your inbox every week

Stay Ahead of Cyber Threats

Join 1,000+ security professionals getting weekly insights