LIVETHREAT INTELLIGENCE
NVD/NISTCVE-2025-29927 — Next.js Middleware Auth Bypass · All versions <15.2.3 affectedCRITICAL 9.1AlienVault OTXAPT29 (Cozy Bear) — Active Spear-Phishing Campaign Targeting NATO DiplomatsCRITICAL 9.3Recorded FutureCl0p Ransomware — MOVEit-style Campaign Targeting MFT Solutions GloballyCRITICAL 9.5Shodan22,000+ Redis Instances Exposed on Port 6379 — No Auth — Cryptominer RiskHIGH 8.9VirusTotalCVE-2025-21298 — Windows OLE Remote Code Execution · CISA KEV Catalog AddedCRITICAL 9.8Censys14,500+ Exposed Kubernetes API Servers Detected — Anonymous Access EnabledHIGH 8.7AlienVault OTXFIN7 Carbanak Group — New JavaScript Backdoor Targeting Retail POS SystemsHIGH 8.4NVD/NISTCVE-2025-24813 — Apache Tomcat RCE via Partial PUT · Exploit Code PublicCRITICAL 9.8Recorded FutureDark Web Auction: 2.1M U.S. Healthcare Records Listed · PII + Insurance DataHIGH 8.1VirusTotalLumma Stealer v4.1 — New Evasion Bypass for Windows Defender SmartScreenHIGH 8.6NVD/NISTCVE-2025-30065 — Apache Parquet RCE via Schema Parsing · CVSS Maximum ScoreCRITICAL 10.0Recorded FutureSalt Typhoon (China) — Telco Backdoors Persist in 3 U.S. Carriers Post-DisclosureCRITICAL 9.2VirusTotalDragonForce Ransomware — New Affiliate Program Attracting LockBit DefectorsHIGH 8.5ShodanCitrix NetScaler Bleed (CVE-2023-4966) — 4,800 Unpatched Hosts Still ExploitableCRITICAL 9.4CensysIvanti Connect Secure 0-Day Chain — Nation-State Actor Exploitation ConfirmedCRITICAL 9.0AlienVault OTXBEC Surge Q1 2026 — $3.1B in Wire Fraud · AI Voice Cloning in UseHIGH 7.9NVD/NISTCVE-2025-29927 — Next.js Middleware Auth Bypass · All versions <15.2.3 affectedCRITICAL 9.1AlienVault OTXAPT29 (Cozy Bear) — Active Spear-Phishing Campaign Targeting NATO DiplomatsCRITICAL 9.3Recorded FutureCl0p Ransomware — MOVEit-style Campaign Targeting MFT Solutions GloballyCRITICAL 9.5Shodan22,000+ Redis Instances Exposed on Port 6379 — No Auth — Cryptominer RiskHIGH 8.9VirusTotalCVE-2025-21298 — Windows OLE Remote Code Execution · CISA KEV Catalog AddedCRITICAL 9.8Censys14,500+ Exposed Kubernetes API Servers Detected — Anonymous Access EnabledHIGH 8.7AlienVault OTXFIN7 Carbanak Group — New JavaScript Backdoor Targeting Retail POS SystemsHIGH 8.4NVD/NISTCVE-2025-24813 — Apache Tomcat RCE via Partial PUT · Exploit Code PublicCRITICAL 9.8Recorded FutureDark Web Auction: 2.1M U.S. Healthcare Records Listed · PII + Insurance DataHIGH 8.1VirusTotalLumma Stealer v4.1 — New Evasion Bypass for Windows Defender SmartScreenHIGH 8.6NVD/NISTCVE-2025-30065 — Apache Parquet RCE via Schema Parsing · CVSS Maximum ScoreCRITICAL 10.0Recorded FutureSalt Typhoon (China) — Telco Backdoors Persist in 3 U.S. Carriers Post-DisclosureCRITICAL 9.2VirusTotalDragonForce Ransomware — New Affiliate Program Attracting LockBit DefectorsHIGH 8.5ShodanCitrix NetScaler Bleed (CVE-2023-4966) — 4,800 Unpatched Hosts Still ExploitableCRITICAL 9.4CensysIvanti Connect Secure 0-Day Chain — Nation-State Actor Exploitation ConfirmedCRITICAL 9.0AlienVault OTXBEC Surge Q1 2026 — $3.1B in Wire Fraud · AI Voice Cloning in UseHIGH 7.9
← Blog·Penetration Testing8 min read2,311 views

Web Application Bug Bounty Case Study: $25,000 Finding in an Airline Rewards API

A broken object-level authorization (BOLA) vulnerability in an airline loyalty API allowed any authenticated user to read and modify the rewards balance of any other customer — a vulnerability that took 20 minutes to find and 8 months to properly fix.

H
HorizonShield Red Team
March 8, 2026

The Target: A Loyalty API with Predictable Resource IDs

During a public bug bounty program, we focused on an airline's loyalty rewards API. The endpoint for retrieving account balance was: GET /api/v2/members/{memberId}/balance. The member ID was a sequential 8-digit integer.

Changing the memberId in the request to any other integer returned the balance of that account — no authorization check. The API verified that the caller was authenticated, but not that the caller was authorized to access that specific memberId.

BOLA: The Most Common API Security Failure

Broken Object Level Authorization (BOLA), known as IDOR in older nomenclature, tops the OWASP API Security Top 10 for a reason. It is the simplest vulnerability conceptually — you are accessing a resource that should not be yours — and among the most commonly missed because API development frameworks do not enforce object-level authorization automatically.

Impact Assessment

Beyond read access, we found the modification endpoints were equally vulnerable. A PUT request to /api/v2/members/{memberId}/balance with a modified memberId allowed us to credit points to our own account using a CSRF-style replay. The theoretical impact: unlimited miles for any attacker, and complete visibility into 47 million customer accounts.

Reporting and Timeline

Initial report: Day 0. Triage accepted: Day 3. Severity confirmed Critical: Day 11. Partial patch (read endpoints only): Day 45. Full remediation across all endpoints: Day 247. Bug bounty paid: $25,000 on Day 89 despite the extended fix timeline, reflecting the severity and quality of the report.

Remediation Pattern

The fix required adding a server-side check on every object-level API operation: does the authenticated user's identity match the owner of the resource being accessed? This check must happen in the application layer, not the API gateway, because the gateway does not understand business-level ownership semantics.

Penetration TestingCybersecurityHorizonShield
← More Articles
H
HorizonShield Red Team
HorizonShield Security Team

Cybersecurity expert at HorizonShield, specializing in threat intelligence, incident response, and enterprise security architecture.