Broken Function Level Authorization
Broken Function Level Authorization is a security vulnerability where an application or API fails to properly restrict which users can invoke certain functions or actions. This allows regular or unauthorized users to access privileged operations, such as administrative functions, that should be off-limits to them. The risk is particularly prominent in APIs, where endpoint discovery may be easier and access control checks are often inconsistently applied.
Broken Function Level Authorization occurs when an API or application fails to enforce adequate authorization checks at the function or endpoint level, allowing authenticated or unauthenticated users to invoke operations beyond their assigned privilege level. Unlike object-level authorization flaws, which concern access to specific data records, BFLA concerns access to privileged functional capabilities, such as administrative endpoints, elevated HTTP methods (e.g., DELETE, PUT), or restricted workflows. The vulnerability typically arises when authorization logic is absent, inconsistently applied, or relies solely on client-side controls or UI-level obscurity rather than server-side enforcement. Detection typically requires deep analysis of the authorization mechanism across all exposed endpoints, including those not surfaced in the standard user interface, and testing with differing user roles and privilege levels. Static analysis tooling may identify missing authorization decorators or middleware in some frameworks, but determining whether authorization logic is semantically correct generally requires runtime testing or dynamic analysis in context.
Why it matters
Broken Function Level Authorization represents one of the most impactful classes of access control failures in modern API-driven applications. When authorization checks are absent or inconsistently applied at the function level, an attacker who gains access as a low-privileged user may be able to invoke administrative endpoints, trigger destructive operations such as bulk deletions, or escalate their capabilities without any additional credential compromise. The consequences typically include unauthorized data modification, privilege escalation, and full administrative takeover of application functions.
Who it's relevant to
Inside BFLA
Common questions
Answers to the questions practitioners most commonly ask about BFLA.