Findings
Response violates schema
Updated: June 19, 2025
Description
Severity:
High
The response body does not conform to the specified schema.
Proper schema validation is crucial to ensuring that data exchanged between systems remains consistent and secure.
Example Attack
Injection Attacks: If an API or application fails to validate incoming data against the expected schema, attackers could potentially inject malicious content that the system may improperly process or execute. This can lead to various security vulnerabilities such as SQL injection, XML injection, or NoSQL injection.
Remediation
Use tooling to ensure that response payloads are validated and sanitized against the API specification.