ANNUAL REPORT

State of Attacks

2026

Read the findings of one entire year of continuous testing and how they can inspire you to improve your cybersecurity posture.

Shape Image

SECTION 01

Introduction

At Fluid Attacks, we help organizations map and understand their attack surface through continuous security assessments. By combining AI, automated tools, and a team of highly certified pentesters, we uncover vulnerabilities across code and environments, helping companies reduce their risk exposure and strengthen their security posture.

In 2025, we tested our clients' systems and contributed to their security throughout the entire software development lifecycle using our Continuous Hacking solution. When we talk about a "system" in this report, we mean any of the three targets of evaluation or their combination: source code, running application*, and infrastructure.

The State of Attacks 2026 report is our annual look at a full year of security testing data.** It is designed to help you benchmark your organization's security posture and set more effective goals. The patterns we've uncovered can guide you toward more secure development practices and faster remediation, ultimately protecting your users, systems, and data.

Data collection period: January 1 - December 31, 2025
*Throughout this report, we refer to this target simply as "application".
**Due to our recent migration to a new data infrastructure, data shown for the year 2024 might differ from the previous report.

Risk exposure matters more than vulnerability count

As a reminder, having fewer vulnerabilities does not mean greater security; what matters is keeping a low risk exposure. A system with ten vulnerabilities scored at CVSS 1.0 each isn't nearly as risky as a system with a single CVSS 10.0 vulnerability. But raw CVSS scores don't make that comparison easy, which is why we developed the CVSSF metric, our adjustment of the standard CVSS score. It is designed to solve its biggest limitations: poor aggregation and difficulty comparing across systems.

Using our example and the CVSSF equation,* the difference becomes stark and closer to reality. Those ten low-severity vulnerabilities add up to a CVSSF of just 0.2. The single critical vulnerability? A CVSSF of 4,096.

*CVSSF = 4^(CVSS-4)

SECTION 02

Executive summary

Here are the most impactful results

[1]

The vulnerability remediation rate climbed to 62.2% by the end of 2025, a 21.2 percentage point increase over 2024.

[2]

Our GenAI (Autofix and Custom Fix) was used to help with vulnerability remediation in 54% of the systems.

[3]

Our IDE plugin and MCP users remediated on average twice as much as nonusers.

[4]

We reported 34% more exposure and 45% more vulnerabilities on average per system this year.

[5]

The number of systems where we found high- and critical-severity vulnerabilities grew by 26%.

[6]

The mean time to remediate critical vulnerabilities keeps decreasing! This year, it decreased by 18%.

[7]

Teams that used our CI Gate remediated vulnerabilities 27% faster, on average, than those that didn't use it.

[8]

Systems that used our CI Gate achieved a 72% remediation rate, compared to 58% for those that didn't use it.

[9]

Our tools, including our new AI SAST, detected 55.8% of the total risk exposure in the systems assessed.

[10]

Manual testing detected an average of risk exposure 5 times higher compared to the tools.

[11]

While our tools are constantly improving, our pentesters add a vital layer of depth: they detected 90% of risk exposure from critical vulnerabilities.

[12]

Critical vulnerabilities had the best cumulative remediation rate by year's end, with 63.8%.

While AI-driven development is improving remediation efficiency, the attack surface is expanding rapidly in parallel. This trend suggests that despite our gains in speed, the overall volume of new code continues to increase total risk exposure.

SECTION 03

Prominent changes

See key differences compared to the previous report

Risk exposure

In 2025, the risk exposure detected per system increased, with the mean rising 8.5% and the median 33.5%.

8.5%

/ Mean

/ Mean

33.5%

/ Median

/ Median

High- and critical-severity vulnerabilities

70% of assessed systems had at least one high- or critical-severity vulnerability—up from 53.3% in 2024.

53.3%

70%

Rating

CVSSv4.0 score

Critical

9.0 - 10.0

High

7.0 - 8.9

Medium

4.0 - 6.9

Low

0.1 - 3.9

None

0.0

Manual vs. automated detection methods

Our tools identified 55.8% of total risk exposure this year, reflecting our continued work improving them. Moreover, our pentesters found most of the riskiest vulnerabilities, reporting 87% of critical-severity findings.

Tools

Pentesters

29.5%

55.8%

70.5%

44.2%

/ Risk exposure

1.1%

13.0%

98.9%

87.0%

/ Critical vulnerabilities

Vulnerability remediation

Mean time to remediate (MTTR) for critical-severity vulnerabilities dropped 17.5%.

17.5%

 / MTTR for critical vulnerabilities

As in previous years, teams that broke the build (i.e., used our CI Gate) remediated faster than those that didn't. This year, the median remediation time for build breakers dropped from 32 days to 21.

  • Time to remediate: Time elapsed between the reporting of a vulnerability and its remediation.

  • Break the build: Security control for CI pipelines in which our CI Gate interrupts software deployment whenever there are still unaccepted vulnerabilities in the product.

SECTION 04

General findings

How was the vulnerability and risk exposure landscape in 2025

27,440,146

Reported risk exposure (CVSSF units)

31,041

Mean risk exposure per system

1,119,396

Reported vulnerabilities

1,266

Mean number of vulnerabilities per system

Risk exposure by severity

High- and critical-severity vulnerabilities accounted for 79.9% of total risk exposure. These represent just 4.5% of all vulnerabilities identified, yet they carried 3 times more risk than the remaining 95.5%.

Severity

Total vulnerabilities

Total risk exposure

Critical

5,609

8,666,452.9

High

44,886

13,249,647.1

Medium

261,732

5,494,206.7

Low

807,169

29,839.2

Risk exposure and vulnerabilities by severity

For each target of evaluation

This year, the usual pattern was maintained, where the number of vulnerabilities decreases as their severity range increases. Results for infrastructure showed a slight deviation, as it did last year.

For source code and applications, our most requested targets, low- and medium-severity vulnerabilities made up 95% of all findings (97.1% for applications, 95.3% for source code). But high- and critical-severity vulnerabilities dominated risk exposure, ranging from 80% to 99% of total risk exposure across all targets, including infrastructure.

Target of evaluation

Total vulnerabilities

Total risk exposure

Source code

978,820

23,530,544.26

Application

140,551

3,903,585.51

Infrastructure

25

6,016.17

Risk exposure by detection method

55.8%

/ Automatic* (SAST, AI SAST⁺, SCA, DAST, CSPM)

/ Automatic* (SAST, AI SAST⁺, SCA, DAST, CSPM)

44.2%

/ Manual** (PTaaS, SCR, RE)

/ Manual** (PTaaS, SCR, RE)

Vulnerabilities found by our automated tools averaged 15.5 CVSSF units. Those found by our pentesters averaged 93.2 units, six times as much.

Our pentesters continue to outperform automation when it comes to uncovering risk linked to critical-severity vulnerabilities.

Note that pentester figures come exclusively from our Advanced plan, which combines testing done by AI, automated tools and pentesters. Tool figures include both Advanced and Essential (automated-only) plans.

Human expertise remains essential for thorough security assessments, even after implementing multiple tools and investing in AI. A comprehensive AppSec solution leverages all three: AI, scanners, and security experts.

Our research report "Boosting AST accuracy through pentesting" digs deeper into how manual testing catches what automation misses.

Vulnerabilities by detection method

Our automated tools identified 88.4% of vulnerabilities. Considering only the 50,477 high- and critical-severity vulnerabilities found in 2025, tools detected 73.4%.

Our automated tools identified 88.4% of vulnerabilities. Considering only the 50,495 high- and critical-severity vulnerabilities found in 2025, tools detected 73.4%.

88.4%

/ Automatic

/ Automatic

11.6%

/ Manual

/ Manual

But for critical-severity vulnerabilities alone, 87% were identified through manual review. As in previous years, manual techniques remain far more effective than vulnerability scanning at uncovering the most serious flaws.

SECTION 05

Top weaknesses

Key detected vulnerabilities by risk and persistence

Top 10 weaknesses

By risk exposure

"Authentication mechanism absence or evasion" topped this ranking, accounting for 19.1% of total risk exposure. Identifying these flaws enabled clients to shut down unauthorized access paths before attackers could exploit them. Together, the top 10 weaknesses contributed 68.4% of overall risk exposure.

Weakness

% Systems

Persistence

Exposure

MEx

006. Authentication mechanism absence or evasion

32.9

8,515

5,233,569.47

614.63

039. Improper authorization control for web services

47.6

10,198

2,597,472.45

254.7

184. Lack of data validation

64.5

40,060

2,134,129.46

53.27

390. Prototype pollution

53.1 

41,131

1,934,665.09

47.04

034. Insecure generation of random numbers

48.3

10,197

1,687,058.57

165.45

211. Asymmetric denial of service - ReDoS

61.8

82,079

1,427,860.84

17.4

100. Server-side request forgery (SSRF)

50.1

14,266

1,207,683.75

84.65

359. Sensitive information in source code - Credentials

37.4

7,791

877,409.08

112.62

002. Asymmetric denial of service

63.1 

35,530

863,976.08

24.32

441. Non-encrypted confidential information - Azure

4.8

1,789

809,671.94

452.58

  • Weakness: The category, while the vulnerability is the particular case with a specific location that belongs to the category

  • Persistence: Number of vulnerabilities identified belonging to the category

  • MEx: Mean risk exposure

Top 10 weaknesses

By percentage of systems

Most weaknesses in this top 10 were found in more than half of the systems. "Lack of data validation," which enables injection attacks, was the most widespread. This one is also among the top 3 in risk exposure (see above).

The listed vulnerabilities constitute 28.6% of the total. Their mean and median temporal CVSS scores mostly ranged from low to medium.

Weakness

% Systems

Persistence

MTS

MdTS

184. Lack of data validation

64.5

40,060

4.4

4.6

067. Improper resource allocation

64.5

22,086

5.1

4.9

002. Asymmetric denial of service

63.1

35,530

5.2

6.6

211. Asymmetric denial of service - ReDoS

61.8

82,079

4.1

4.6

063. Lack of data validation - Path Traversal

58.0

17,391

3.5

2.7

390. Prototype Pollution

53.1

41,131

3.7

2.7

008. Reflected cross-site scripting (XSS)

52.5

39,520

1.9

1.3

086. Missing subresource integrity check

51.1

18,303

1.1

0.6

100. Server-side request forgery (SSRF)

50.1

14,266

5.2

6.6

034. Insecure generation of random numbers

48.3

10,197

5.0

8.1

  • MTS: Mean CVSS temporal score

  • MdTS: Median CVSS temporal score

Top 5 weaknesses

Target of evaluation: source code

By risk exposure

This top 5 matches the overall top 10 for risk exposure exactly. Nearly all vulnerabilities in these categories were found in source code. They represent just over 10% of vulnerabilities in this target, yet account for 50% of its risk exposure.

"Authentication mechanism absence or evasion" was the least frequently reported weakness on this list, yet ranked first, representing 15.9% of total risk exposure.

Weakness

Persistence

Exposure

MEx

006. Authentication mechanism absence or evasion*

6,767

3,737,299.38

552.28

039. Improper authorization control for web services

9,447

2,193,541.9

232.19

184. Lack of data validation

39,358

2,112,920.67

53.68

390. Prototype Pollution

40,625

1,934,665.09

46.63

034. Insecure generation of random numbers

10,166

1,682,427.79

165.5

*Recommendation: Validate data types on the server side for all input fields in the application.

Top 5 weaknesses

Target of evaluation: application

By risk exposure

"Authentication mechanism absence or evasion" leads this top 5 as well. Together, these categories represent 43.3% of all vulnerabilities identified in applications and account for 67.9% of their risk exposure.

"Lack of data validation - Token," though fifth in the ranking, has the second highest MEx. It is when a JWT access token doesn't validate the signature, so attackers can modify the token and have their requests accepted, or even remove the signature entirely and find success.

Weakness

Persistence

Exposure

MEx

006. Authentication mechanism absence or evasion

1,748

1,496,270.08

855.99

203. Unauthorized access to files - Cloud Storage Services*

13,499

500,832.48

37.1

039. Improper authorization control for web services

754

403,933.18

535.72

333. Insecure service configuration - EC2

44,667

149,840.91

3.35

353. Lack of data validation - Token

167

100,952.83

604.51

*Recommendation: Restrict access to the system's public storage services.

SECTION 06

Vulnerability remediation

Discover remediation times and rates

All vulnerabilities

62.2%

/ Remediated

/ Remediated

0.9%

/ In progress

/ In progress

4.1%

/ Accepted

/ Accepted

49.0%

/ New

/ New

Our clients remediated nearly two-thirds of all vulnerabilities. Systems that used our CI Gate reached a 72.2% remediation rate by year's end, versus 58% for systems that didn't use it.

Cumulative remediation rates varied by severity: 38.8% for low, 51.9% for medium, 49.2% for high, and 63.8% for critical. Only 0.1% of high-severity and 0.3% of critical-severity vulnerabilities were permanently accepted—approaching the ideal target of zero.

  • New: The organization has not yet defined treatment for the vulnerability.

  • In progress: The organization already has plans to remediate the vulnerability.

  • Closed: The organization has already remediated the vulnerability.

  • Temporarily accepted: The organization has decided not to remediate the vulnerability for the moment.

  • Permanently accepted: The organization has decided not to remediate the vulnerability.

Remediation and MCP use

We offer an MCP server that allows clients to ask AI tools questions about their security posture, including recommendations for risk mitigation. This year, it was used by 41% of our clients. Their mean remediation rate was 49.7%, which contrasts with the 24.1% rate of clients who did not use the MCP.

*We began tracking MCP use in June 2025.

Time to remediate

Median days to remediate

22

/ Using CI Gate

/ Using CI Gate

30

/ Not using CI Gate

/ Not using CI Gate

Comparing medians, teams remediated vulnerabilities 26.7% faster in systems that used our CI Gate (broke the build) than in those that didn't.

Ideally, higher severity means faster remediation. That's what happened: critical-severity vulnerabilities were remediated 36% (mean) and 50% (median) faster than low-severity ones.

Severity

MTTR

MdTTR

Remediated vulnerabilities

Low

56

28

312,957

Medium

51

30

135,762

High

60

40

22,045

Critical

36

14

3,581

  • MTTR: Mean time to remediate

  • MdTTR: Median time to remediate

Remediation rate over time

By risk exposure

While 62.2% of vulnerabilities were remediated, overall risk exposure dropped 55% by year's end. The remaining exposure is heavily influenced by high-risk vulnerabilities (high CVSSF values) that were still open when we closed data collection. Specifically, high-severity vulnerabilities accounted for 51% of the final unremediated exposure.

Remediation rate over time

All vs. high- and critical-severity vulnerabilities

More vulnerabilities were discovered than fixed each month.* Still, the cumulative remediation rate climbed from 11.1% to 42.4% by year's end (average: 30.2%).

The cumulative rate for high- and critical-severity vulnerabilities consistently outpaced the overall rate, trending upward as it did last year. It ranged from 12.5% at the end of January to 51.8% at the end of November (average: 36.5%).

*Methodology: We tracked cumulative vulnerabilities reported and remediated by month's end. For January, only vulnerabilities identified and closed within that month were counted as remediated. For subsequent months, any vulnerability closed that month was counted, regardless of when it was detected in 2025.

Remediation rate over time

By severity

For most of the year, cumulative remediation rates followed the expected pattern: higher severity, higher rate. Low-severity vulnerabilities had the lowest rate (average: 26.4%), and critical-severity ones had the highest (average: 50.2%). The exception to the pattern was medium-severity vulnerabilities (average: 40.3%), which outpaced high-severity ones (average: 34.7%). Also unexpected, but welcomed, was the high remediation rate for critical flaws seen in January.

Distribution of remediation rates

By target of evaluation

We ranked vulnerabilities by remediation time, from shortest to longest, with unremediated vulnerabilities at the end. We then divided the full data set into ten equal groups (deciles).

Applications showed the fastest remediation overall. About a third of vulnerabilities in running applications were remediated in 16 days or less; for source code, reaching that 30% mark took 99 days. Applications were also the only target where at least 40% of vulnerabilities were remediated, achieved in 30 days.

Infrastructure had too few reported vulnerabilities to include in this analysis and does not appear in the chart below.

Distribution of remediation rates

By severity

Critical-severity vulnerabilities were the only ones for which remediation rates exceeded 60%. A 50% rate was completed more promptly for this group than for the medium- and high-severity vulnerabilities (45, 227, and 286 days, respectively). Low-severity vulnerabilities were the only range that did not reach a 40% remediation rate by the end of 2025.

Remediation and IDE plugins adoption

23% of our clients used our IDE plugins.* These integrate with VS Code, Cursor, and IntelliJ IDEA, letting developers see vulnerable lines of code directly and access management options like GenAI-assisted remediation and reattacks. Clients who used our plugins had a mean remediation rate of 55.4%, versus 28.1% for those who didn't.

*We began tracking plugin use in March 2025.

Remediation with custom prioritization criteria

Around 2% of our clients set vulnerability prioritization criteria in a different arrangement to the default.* This feature allows clients to customize which of the following criteria have greater weight than others: fixing cost, dependency usage (in preproduction only or also in production), transitivity, EPSS, and KEV. Clients with a custom arrangement had a mean remediation rate of 64.4%, versus 34% for those using the default.

*We began tracking customization use in March 2025.

SECTION 07

Vulnerability remediation support

Find out how much companies relied on the help of our AI and experts

53.6%

/ Systems using Autofix and Custom Fix*

/ Systems using Autofix and Custom Fix*

24.5%

/ Systems using Talk to a Pentester

/ Systems using Talk to a Pentester

*We began tracking Autofix and Custom Fix in March 2025.

We offer several support channels for vulnerability remediation. The main ones are Autofix, Custom Fix, and Talk to a Pentester. The first two use generative AI in the IDE extensions, platform or both: Autofix provides automatic, suggested fixes, while Custom Fix offers comprehensive step-by-step guides. Talk to a Pentester, available only on the Advanced plan, lets you schedule 30-minute calls with our pentesters to work through complex vulnerabilities.

Autofix and Custom Fix were used in more than half the systems; Custom Fix was far more common (93% of those systems). These tools were used to help with mostly low- and medium-severity vulnerabilities.

This year, assistance sessions with our experts were requested for around a quarter of the systems evaluated. Not all Advanced plan clients use this feature, even though it could help a lot to increase the remediation of critical issues, so we encourage all those not using it to try it.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which organizations of all sizes are already enjoying.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which organizations of all sizes are already enjoying.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which organizations of all sizes are already enjoying.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Get an AI summary of Fluid Attacks

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

© 2026 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

Get an AI summary of Fluid Attacks

© 2026 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

Get an AI summary of Fluid Attacks

© 2026 Fluid Attacks. We hack your software.