San Antonio API Security Summit 2025 に参加しよう!
San Antonio API Security Summit 2025 に参加しよう!
San Antonio API Security Summit 2025 に参加しよう!
San Antonio API Security Summit 2025 に参加しよう!
San Antonio API Security Summit 2025 に参加しよう!
San Antonio API Security Summit 2025 に参加しよう!
閉じる
プライバシー設定
ウェブサイト運営に必要なCookieや類似技術を使用しています。追加のCookieは貴社の同意がある場合のみ利用されます。同意は「Agree」をクリックすることでいただけます。どのデータが収集され、どのようにパートナーと共有されているかの詳細は、Cookieポリシープライバシーポリシーをご確認ください。
Cookieは、貴社デバイスの特性や、IPアドレス、閲覧履歴、位置情報、固有識別子などの特定の個人情報を取得、解析、保存するために使用されます。これらのデータは様々な目的で利用されます。分析Cookieによりパフォーマンスを評価し、オンライン体験やキャンペーンの効果向上に役立てます。パーソナライズCookieは、利用状況に応じた情報やサポートを通じ、貴社専用の体験を提供します。広告Cookieは、第三者が貴社のデータをもとにオーディエンスリストを作成し、ソーシャルメディアやネット上でのターゲット広告に使用します。貴社は各ページ下部のリンクから、いつでも同意の許可、拒否、または撤回が可能です。
ご送信ありがとうございます。内容を受け付けました。
申し訳ありません。フォーム送信時にエラーが発生しました。

New Research Reveals APIs are the Single Most Exploited Attack Surface

February 17, 2026

Wallarm 2026 API ThreatStats Report finds APIs sit at the center of vulnerabilities, exploited CVEs, and real-world breaches, with AI and agentic systems accelerating risk

Austin, TX — Feb. 17, 2026Wallarm released today The 2026 API ThreatStats Report, a data-driven analysis of API attack telemetry, published vulnerabilities, confirmed exploitation, and API-related breaches disclosed in 2025. The report shows a consistent pattern CISOs can’t afford to treat as “just an AppSec problem” – attackers are successfully exploiting repeatable failures in identity, access control, and exposed interfaces, often at machine speed and massive scale.

APIs dominate vulnerability and exploit reality, not just theory. APIs are the primary focus of vulnerability and exploit concerns, moving beyond theoretical discussions into real-world threats. Wallarm analyzed 67,058 published vulnerabilities from 2025 and found 11,053 (17%) were API-related. In parallel, analysis of CISA KEV additions in 2025 found that 43% were API-related, making APIs the single largest exploited surface in the dataset.

“API security is at the heart of any AI transformation,” said Ivan Novikov, Founder & CEO at Wallarm. “Every AI application or agent interaction is mediated through an API. API security is integral to successful AI adoption, and AI by its very nature has made the consequences of getting it wrong much larger and much more impactful.”

Key findings from the 2026 API ThreatStats Report

AI security is API security, and the overlap is not subtle. The report found 2,185 AI-related vulnerabilities in 2025, with 786 overlapping API-related vulnerabilities. That means 36% of AI vulnerabilities involve APIs. In exploited vulnerabilities, the pattern persists: 36% of AI-related KEVs also involved an API attack surface.

“Abuse beats bugs” in real-world API attacks. The API ThreatStats Top 10, based on observed attack volume, shows attackers favor logic abuse, trust failures, and resource consumption over traditional code defects. In 2025, Cross-Site Issues moved to the top by attack volume, while Injections remained a high-impact anchor threat, and Broken Access Control continued to enable scalable exploitation.

Agentic AI introduces a new control plane risk: MCP. Model Context Protocol (MCP) emerged as a leading indicator of where API risk is heading. Wallarm identified 315 MCP-related vulnerabilities in 2025, representing 14% of all published AI vulnerabilities. MCP vulnerabilities showed extreme momentum, including 270% growth from Q2 to Q3 in 2025, and were tied to a Top 10 API breach involving thousands of exposed MCP servers.

Most API vulnerabilities are fast, remote, and easy to exploit. Attackers take full advantage of these attributes. The report found 97% of API vulnerabilities can be exploited with a single request, 98% are easy or trivial to exploit, and 99% are remotely exploitable. In 59% of cases, no authentication is required. Traditional security tools that don’t provide real-time blocking fall short in defending against these API attacks. 

What this means for CISOs

The report’s breach analysis reinforces that the most damaging incidents are not driven by sophisticated adversaries. They are driven by repeatable gaps in identity handling and exposed API surfaces. In 2025 breach data, AI platforms and tooling accounted for 15% of API-related breaches, tying software as the largest category in the dataset.

For security leaders, the takeaway is direct: improving AI security is about APIs, and improving API security is not about chasing new attack classes. It’s about systematically addressing identity, exposure, and abuse before automation and scale turn familiar weaknesses into material business risk.

Download the full report here: https://www.wallarm.com/reports/2026-wallarm-api-threatstats-report 

About Wallarm
From business critical traffic to agentic AI, APIs make modern business possible. And Wallarm is the API security platform built to protect them. With Wallarm, you can stop attacks, not just detect them. We help you understand your API risk, detect abuse and business logic attacks, and block real threats in real time. Wallarm works across cloud-native, multi-cloud, hybrid, and on-prem environments so your business can stay on track. Backed by Toba Capital and Y Combinator and headquartered in Austin, Texas, Wallarm protects the APIs your business is built on.

Media Contact:
Bodie Lowe
Touchdown PR for Wallarm
wallarm@touchdownpr.com
512-599-4015

貴社のAPIを守る準備はできましたか?

Wallarmは、迅速な開発と安全な運用を実現するために、貴社をサポートします。