What it is
API exposure occurs when APIs are publicly accessible without proper authentication, authorization, or scope restrictions, or when internal APIs are unintentionally reachable from external networks. This can happen due to misconfigurations, overly permissive access controls, or lack of visibility into deployed endpoints.
Why it matters
APIs often provide direct access to sensitive data and core business logic. When exposed, attackers can exploit them to extract data, manipulate records, or automate abuse at scale. Many modern breaches originate from exposed APIs because they are machine-friendly and easy to enumerate.