This document discusses security considerations for AJAX applications. It notes that while AJAX itself is not inherently less secure, the increased complexity presents extra risks. Typical vulnerabilities include XSS and SQL injection from user input, and unauthorized access to files on the server. Popular CMS platforms like WordPress that include AJAX functionality can be targets if not updated properly. A common scenario involves credentials being displayed unencoded in URLs and then sent back to servers without authentication, allowing hacking. The document provides recommendations like proper user input validation, authentication, authorization, and use of HTTPS to help secure AJAX applications.