OWASP Top 10

Top 10 Web Application Security Risks (2025)

The OWASP Top 10 (2025) represents a broad consensus about the most critical security risks to web applications. While not comprehensive, the Hacksplaining library offers lessons in each category to help you understand and defend against these risks.

OWASP Top 10 2025 changes from 2021
Changes to the OWASP Top 10 since 2021

1. Broken Access Control

Unchanged, now includes SSRF (was #10 in 2021)

Access control enforces policy such that users cannot act outside their intended permissions. Failures typically lead to unauthorized information disclosure, modification, or destruction of data or performing a business function outside the user’s limits. Server-Side Request Forgery (SSRF) has been consolidated into this category for 2025.

A01:2025 Broken Access Control on owasp.org

Example lessons in this category:

  • Broken Access Control

    All resources on your site need to have access control implemented, even if they aren't intended to be discoverable by a user.
  • Directory Traversal

    Ensure file paths are safely interpreted, or hackers can access sensitive files on your server.
  • Cross-Site Request Forgery

    If an attacker can forge HTTP requests to your site, they may be able to trick your users into triggering unintended actions.
  • Server-Side Request Forgery

    An attacker can use SSRF vulnerabilities to probe your internal network
  • Open Redirects

    Most web-applications make use of redirects. If your site forwards to URLs supplied in a query string, you could be enabling phishing attacks.

2. Security Misconfiguration

+3 spots (was #5 in 2021)

Security misconfiguration occurs when a system, application, or cloud service is set up incorrectly, creating vulnerabilities. This includes unchanged default credentials, disabled security features, unnecessary components enabled, and overly verbose error messages that expose sensitive information.

A02:2025 Security Misconfiguration on owasp.org

Example lessons in this category:

3. Software Supply Chain Failures

New, replaces "Vulnerable and Outdated Components" (#6 in 2021)

Software supply chain failures are breakdowns or compromises in the process of building, distributing, or updating software. This goes beyond just using outdated components — it includes malicious changes in third-party code, compromised CI/CD pipelines, and dependencies obtained from untrusted sources.

A03:2025 Software Supply Chain Failures on owasp.org

Example lessons in this category:

4. Cryptographic Failures

-2 spots (was #2 in 2021)

Cryptographic failures stem from weak or improperly implemented cryptography, including broken algorithms, inadequate key management, and insufficient encryption of sensitive data. All data in transit should be encrypted at the transport layer, and data at rest must be protected through strong cryptographic practices.

A04:2025 Cryptographic Failures on owasp.org

Example lessons in this category:

5. Injection

-2 spots (was #3 in 2021)

Injection flaws occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization. This includes SQL, NoSQL, OS command, and other injection types.

A05:2025 Injection on owasp.org

Example lessons in this category:

6. Insecure Design

-2 spots (was #4 in 2021)

Insecure design addresses vulnerabilities stemming from flawed architectural and design decisions rather than implementation errors. The design phase of your development lifecycle should gather security requirements and model threats, integrating security throughout the development lifecycle rather than adding it as an afterthought.

A06:2025 Insecure Design on owasp.org

Example lessons in this category:

7. Authentication Failures

Unchanged, renamed from "Identification and Authentication Failures"

Authentication failures allow attackers to assume the identity of legitimate users through weak or bypassed authentication mechanisms. This includes credential stuffing, brute force attacks, weak passwords, and improper session management.

A07:2025 Authentication Failures on owasp.org

Example lessons in this category:

8. Software or Data Integrity Failures

Unchanged from 2021

Software and data integrity failures relate to code and infrastructure that don’t protect against integrity violations. This includes applications that rely upon plugins, libraries, or modules from untrusted sources, insecure deployment pipelines, and auto-update functionality that downloads updates without sufficient integrity verification.

A08:2025 Software or Data Integrity Failures on owasp.org

Example lessons in this category:

9. Security Logging and Alerting Failures

Unchanged, renamed from "Security Logging and Monitoring Failures"

Insufficient logging, monitoring, and alerting prevents timely detection and response to breaches and attacks. Without proper logging of security events and effective alerting mechanisms, attackers can further attack systems, maintain persistence, and tamper with or extract data undetected.

A09:2025 Security Logging and Alerting Failures on owasp.org

Example lessons in this category:

  • Logging and Monitoring

    Comprehensive logging and monitoring will tell you what your site is doing at runtime, which is key to spotting security events.

10. Mishandling of Exceptional Conditions

New in 2025, SSRF consolidated into #1

Mishandling exceptional conditions occurs when programs fail to prevent, detect, and respond to unusual situations, leading to crashes, unexpected behavior, and security vulnerabilities. This includes exposing sensitive data through error messages, “failing open” instead of securely, and improper cleanup when exceptions occur.

A10:2025 Mishandling of Exceptional Conditions on owasp.org

Example lessons in this category: