Broken Authentication
Broken authentication refers to security weaknesses in a web application's login process or session management that allow attackers to impersonate legitimate users. These flaws can enable unauthorized access to user accounts by compromising passwords, session tokens, or other credentials. It is considered an umbrella term covering several distinct vulnerability types related to how applications verify and maintain user identity.
Broken authentication is a class of web application vulnerabilities arising from incorrect implementation of authentication mechanisms and session management controls. Affected implementations may exhibit logic flaws or coding errors that allow authentication to be bypassed entirely, or may inadequately protect credentials, session tokens, or API keys in ways that permit an attacker to assume another user's identity. The category encompasses weaknesses such as insecure credential storage, predictable or poorly invalidated session tokens, and flawed multi-factor or login flow logic. Because authentication correctness depends heavily on runtime behavior and application-specific logic, many instances of broken authentication are not detectable through static analysis alone and typically require dynamic testing or runtime context to identify.
Why it matters
Authentication is the foundation of access control in any application. When authentication mechanisms are broken, an attacker does not need to exploit complex vulnerabilities elsewhere in the system because they can simply impersonate a legitimate user and inherit all of that user's privileges. This makes broken authentication one of the highest-impact vulnerability classes, as it can lead directly to account takeover, unauthorized access to sensitive data, privilege escalation, and downstream compromise of connected systems.
The vulnerability class is particularly dangerous because it is broad. It covers everything from weak password policies and insecure credential storage to predictable session tokens and flawed multi-factor authentication logic. A single flaw in any part of the login flow or session lifecycle can be sufficient for an attacker to gain unauthorized access. Because these weaknesses span the full authentication lifecycle, they are difficult to address through a single control and typically require coordinated improvements across application design, implementation, and configuration.
Broken authentication has been recognized as a critical risk category by OWASP for multiple consecutive years in its Top 10 list, reflecting the persistent frequency and severity of these vulnerabilities across web applications. The category appears consistently because correct authentication implementation requires careful attention to runtime behavior and application-specific logic, not just adherence to coding patterns, making it easy for subtle flaws to go undetected through standard code review alone.
Who it's relevant to
Inside Broken Authentication
Common questions
Answers to the questions practitioners most commonly ask about Broken Authentication.