When I think of API security, I’m tempted to focus on the "hard" technical flaws. I look for SQL injection where code is improperly sanitized or Broken Authentication where a token is clearly invalid, because these are binary errors. They are either right or wrong.
API6:2023 (Unrestricted Access to Sensitive Business Flows) is different. It is the most deceptive vulnerability on the OWASP list because the request itself often looks perfectly legitimate. The API isn't "broken" in a traditional sense. It is doing exactly what it was designed to do. The problem isn't the code. The problem is the context.
Buying a concert ticket is a standard business flow. Buying 10,000 tickets in 4 seconds is an exploit.
This vulnerability occurs when an API exposes a business process without accounting for how that process could be abused through automation. Common examples include purchasing a product, posting a comment, or reserving a seat. Because the server cannot distinguish between a highly active user and a malicious script, it allows the attacker to exhaust resources, manipulate markets, or degrade the service for everyone else.
Let’s look at three incidents from 2020 to 2025 where this specific vulnerability caused massive disruption.
The most high-profile example of Business Flow abuse in recent history occurred during the presale for Taylor Swift’s "Eras Tour" in November 2022.
Ticketmaster’s API was designed to handle a massive influx of traffic. However, it failed to effectively throttle the specific business flow of reserving tickets.
Between 2020 and 2023, the retail sector faced a persistent API6 crisis involving the sale of high-demand items like PlayStation 5 consoles and NVIDIA GPUs.
Retailers like Best Buy and Walmart exposed APIs for their mobile apps and websites that handled inventory checks and "Add to Cart" flows.
A more technical variation of this vulnerability involves abusing the logic of rewards programs. This was seen in recent findings regarding gift card implementations.
In 2024, security researchers at Outpost24 detailed a vulnerability (CVE-2024-58248) in the nopCommerce platform that allowed for "double-spending" due to unrestricted flow access.
Preventing API6:2023 requires understanding the business logic rather than just the code syntax.
The incidents involving Ticketmaster, retail bots, and gift card fraud all share a common thread: the code worked perfectly, but the logic failed. API6:2023 forces us to stop thinking of security as just a technical checklist. We cannot simply scan our way out of this vulnerability because a scanner sees a valid request; only a human understands a valid intent.
To secure modern applications, we must move beyond securing endpoints and start securing flows. We must ask not just "Is this user allowed to visit this page?" but "Is this user allowed to perform this action at this speed and in this volume?"
Understanding the context of your business is now just as important as understanding the syntax of your code.