🔓 AppSec📋 OWASP Top 10🆕 2025 Edition✓ SOC 2 · ISO 27001

OWASP Top 10 -2025 Edition Breakdown

The OWASP Top 10 is the most widely referenced web application security standard in the world. Every developer, security engineer, and compliance team needs to understand it. Here is exactly what the 2025 edition contains, what changed, and what to do about each category.

SS
Soham Sawant
✍️ Cybersecurity Expert & Technical Writer·📖 10 min read
📅 March 2026·🏢 SecComply
OWASP web application security code analysis

Web application security remains the highest-risk attack surface for most organisations. The OWASP Top 10 defines the ten vulnerability categories responsible for the majority of successful web application attacks.

OWASP Top 10 -2025 Edition OverviewRANKED BY PREVALENCEA01Broken Access ControlA02Cryptographic FailuresA03InjectionA04Insecure DesignA05Security MisconfigurationA06Vulnerable ComponentsA07Auth FailuresA08Data Integrity FailuresA09Logging FailuresA10SSRFVULNERABILITY SEVERITY DISTRIBUTIONCriticalA01 Broken Access Control · A02 Cryptographic Failures2HighA03 Injection · A04 Insecure Design · A05 Misconfig · A06 Components4MediumA07 Auth Failures · A08 Integrity Failures · A09 Logging3EmergingA10 SSRF -elevated in 2025 edition12025 KEY CHANGE:SSRF elevated to standalone A10 · AI code security guidance added · SBOM required for A06COMPLIANCE MAPPINGISO 27001A.8.25-A.8.31SOC 2CC8.1 Secure DevPCI DSSReq 6.2 / 6.3OWASP ASVSAll levelsHIPAA164.312(c)

OWASP Top 10 2025 -ranked by prevalence, severity distribution, key 2025 changes, and compliance framework mapping across ISO 27001, SOC 2, PCI DSS, and HIPAA.

0%
of applications tested had at least one Broken Access Control vulnerability
OWASP Top 10, 2025
0
vulnerability categories covering the majority of successful web application attacks
OWASP Foundation
0
major compliance frameworks that explicitly reference OWASP as a secure coding standard
ISO 27001, SOC 2, PCI DSS

What Is the OWASP Top 10?

The OWASP Top 10 is a regularly updated list of the ten most critical web application security risks, published by the Open Web Application Security Project. It is consensus-based, data-driven, and updated to reflect the real-world vulnerability landscape across thousands of applications.

For developers, it is a secure coding reference. For security teams, it is a penetration testing and code review framework. For compliance officers, it is referenced directly by ISO 27001 Annex A.8, SOC 2 CC8.1, and PCI DSS Requirement 6 as the benchmark for secure application development practices.

"Understanding the OWASP Top 10 is not optional for any team building or securing web applications. It is the minimum baseline. Everything else builds on top of it."

All 10 Categories -2025 Edition

A01
Broken Access Control
CWE-200 · CWE-284 · CWE-285 · CWE-352 · CWE-639

The number one vulnerability since 2021. Found in 94% of tested applications. Access control enforces that users cannot act outside their intended permissions. Broken access control includes IDOR (insecure direct object references), missing function-level access control, privilege escalation from user to admin, CORS misconfigurations that allow unauthorised API access, and JWT token manipulation to elevate privileges.

Fix: Enforce access control server-side on every request. Deny by default. Log access control failures. Rate-limit API endpoints. Never rely on client-side state for access decisions.
IDORCORSJWTPrivilege Escalation
A02
Cryptographic Failures
CWE-261 · CWE-296 · CWE-310 · CWE-319 · CWE-321

Previously called "Sensitive Data Exposure" -renamed to focus on the root cause rather than the symptom. Cryptographic failures cover: transmitting sensitive data in clear text (HTTP, SMTP without TLS), using weak or deprecated algorithms (MD5, SHA1, DES), hardcoded cryptographic keys, missing encryption at rest for sensitive data, and improper certificate validation.

Fix: Classify all data by sensitivity. Encrypt all sensitive data at rest (AES-256) and in transit (TLS 1.2+). Never use deprecated algorithms. Use a KMS for key management. Disable HTTP, enforce HTTPS everywhere.
TLSAES-256Key ManagementMD5/SHA1 Deprecated
A03
Injection
CWE-20 · CWE-74 · CWE-75 · CWE-77 · CWE-78 · CWE-89

SQL injection, OS command injection, LDAP injection, and Cross-Site Scripting (XSS) are all included here. Injection occurs when an application sends untrusted data to an interpreter as part of a command or query. SQL injection remains one of the most destructive vulnerabilities -a single injectable endpoint can lead to full database exfiltration. XSS allows attackers to execute scripts in victims' browsers, enabling session hijacking and credential theft.

Fix: Use parameterised queries and prepared statements. Never concatenate user input into queries. Apply input validation and output encoding. Use WAF rules for known injection patterns. Run SAST on every commit.
SQL InjectionXSSCommand InjectionParameterised Queries
A04
Insecure Design
CWE-73 · CWE-183 · CWE-209 · CWE-213 · CWE-235

New in the 2021 list and reinforced in 2025, insecure design focuses on design-level flaws rather than implementation bugs -missing security controls by design rather than misconfigured ones. An application that never implemented rate limiting on authentication endpoints has an insecure design flaw. No amount of patching fixes a design problem -it requires redesign. This is why threat modeling at the design phase is critical.

Fix: Integrate threat modeling into the design phase for every significant feature. Use secure design patterns. Establish security requirements alongside functional requirements. Reference OWASP ASVS as a design checklist.
Threat ModelingSTRIDESecure DesignOWASP ASVS
A05
Security Misconfiguration
CWE-2 · CWE-11 · CWE-13 · CWE-15 · CWE-16

Found in 90% of tested applications. Security misconfiguration covers default credentials left unchanged, unnecessary features enabled, verbose error messages exposing stack traces, missing security headers (CSP, HSTS, X-Frame-Options), overly permissive CORS policies, and cloud storage buckets left publicly accessible. As applications increasingly run on cloud infrastructure, misconfiguration has become the dominant attack vector.

Fix: Implement a repeatable hardening process. Remove all default credentials. Disable unnecessary features and services. Send minimal error information to clients. Use CSPM to continuously monitor for misconfigurations.
Security HeadersCORSDefault CredentialsCSPM
A06
Vulnerable and Outdated ComponentsUpdated 2025
CWE-1035 · CWE-1104

Applications using components -libraries, frameworks, operating systems -with known vulnerabilities are directly exploitable. Log4Shell was the most prominent example: a critical vulnerability in a logging library used by hundreds of thousands of applications globally. The 2025 edition adds explicit SBOM (Software Bill of Materials) requirements, reflecting regulatory pressure and the widespread adoption of SBOM as a supply chain security control.

Fix: Maintain a Software Bill of Materials (SBOM). Use SCA tools (Dependabot, Snyk, OWASP Dependency-Check) in your CI pipeline. Subscribe to vulnerability alerts for your dependencies. Patch critical vulnerabilities within 72 hours.
SBOMSCALog4ShellDependabotCVE
A07
Identification and Authentication Failures
CWE-255 · CWE-259 · CWE-287 · CWE-288 · CWE-330

Authentication failures include: permitting weak or default passwords, missing or ineffective MFA, exposing session IDs in URLs, not invalidating sessions on logout, credential stuffing enabled by missing rate limiting, and insecure password reset flows. In 2025, the category specifically calls out authentication bypass vulnerabilities in AI-powered chatbots and LLM-integrated applications as an emerging concern.

Fix: Enforce MFA everywhere. Implement rate limiting and account lockout on authentication endpoints. Invalidate sessions server-side on logout. Use a proven identity provider (Okta, Auth0) rather than building custom auth.
MFASession ManagementCredential StuffingRate Limiting
A08
Software and Data Integrity FailuresUpdated 2025
CWE-345 · CWE-353 · CWE-426 · CWE-494 · CWE-502

This category covers insecure deserialization and CI/CD pipeline integrity failures. An application that automatically updates without verifying the integrity of the update -using a compromised package registry, a tampered npm package, or a supply chain poisoning attack -falls here. The SolarWinds attack is the canonical example. The 2025 edition strengthens the connection to software supply chain attacks and adds guidance on securing AI model pipelines.

Fix: Verify digital signatures on software and updates. Use trusted package registries with integrity checking. Implement pipeline security -prevent tampering with build artifacts. Never deserialise data from untrusted sources without validation.
DeserializationSupply ChainCI/CD SecuritySolarWinds
A09
Security Logging and Monitoring Failures
CWE-117 · CWE-223 · CWE-532 · CWE-778

Without adequate logging and monitoring, breaches go undetected. The average dwell time -time between initial compromise and detection -is 197 days globally. Logging failures include: no logging of authentication events or high-value transactions, logs not monitored for suspicious activity, log tampering possible (logs stored on the same system as the application), and no incident response procedures triggered by log alerts.

Fix: Log all authentication events, access control failures, and high-value transactions. Centralise logs in a SIEM. Configure alerts for anomalous activity. Ensure logs cannot be deleted by the application process. Retain logs for at least 12 months.
SIEMAudit LoggingLog RetentionAlert Rules
A10
Server-Side Request Forgery (SSRF)Elevated 2025
CWE-918

SSRF vulnerabilities allow attackers to induce the server-side application to make HTTP requests to an arbitrary domain -including internal services that are not publicly accessible. In cloud environments, SSRF is particularly dangerous because it can be used to access instance metadata endpoints (AWS IMDSv1) and retrieve IAM credentials. SSRF is elevated to a standalone category in 2025 reflecting its increasing prevalence in cloud-native applications and its role in several high-profile breaches.

Fix: Validate and sanitise all client-supplied input URLs. Use an allowlist of permitted domains. Disable HTTP redirections. Enforce IMDSv2 on AWS instances. Do not return raw responses from server-side requests to clients.
SSRFIMDSv2Cloud SecurityURL Validation
Developer reviewing secure code

Addressing OWASP Top 10 vulnerabilities requires both developer education and automated tooling integrated into the CI/CD pipeline -one without the other is insufficient.

OWASP Top 10 and Compliance Frameworks

The OWASP Top 10 is not just a security reference -it is a compliance requirement. Here is how it maps to the frameworks most commonly required by enterprise customers and regulators:

FrameworkReference to OWASPWhat It Requires
ISO 27001Annex A.8.25-A.8.31Secure development lifecycle, secure coding, application security testing -OWASP Top 10 is the accepted technical reference for all three
SOC 2CC8.1 -Change managementSoftware development follows secure coding practices. OWASP compliance evidence (SAST results, penetration test reports mapped to Top 10) satisfies this criterion
PCI DSSRequirement 6.2 and 6.3Explicitly references OWASP as the standard for identifying and addressing common vulnerabilities. Requirement 6.2.4 requires protection against all OWASP Top 10 categories
HIPAA164.312(c) -Integrity controlsProtecting ePHI integrity from improper alteration -OWASP Top 10 addresses the primary attack vectors against integrity
GDPR / DPDPArticle 32 / Section 8(5)Appropriate technical measures to protect personal data -OWASP Top 10 remediation directly addresses the technical requirements

Implementing OWASP Top 10 in Your SDLC

Knowing the Top 10 categories is the starting point. Operationalising them across your development lifecycle is where the work actually happens.

🛠️
Tool Stack for OWASP Coverage

SAST (Semgrep, SonarQube, Checkmarx) -catches A03 Injection, A02 Cryptographic Failures, A07 Auth issues in code before commit. SCA (Snyk, OWASP Dependency-Check) -catches A06 Vulnerable Components. DAST (OWASP ZAP, Burp Suite) -catches A01 Broken Access Control, A05 Misconfiguration, A10 SSRF at runtime. Penetration testing -validates all 10 categories in your specific environment. No single tool covers all 10 -you need the full stack.

⚠️
AI-Generated Code and OWASP 2025

The 2025 edition adds specific guidance on AI-generated code security. LLM coding assistants generate code that frequently contains A03 Injection patterns, A07 Authentication failures, and A02 Cryptographic weaknesses -because they are trained on historical code repositories that predate modern security practices. Every line of AI-generated code must pass the same SAST review as human-written code. No exceptions.

Are Your Applications OWASP-Compliant?

SecComply's VAPT service tests your web applications against the OWASP Top 10 and produces a report that satisfies ISO 27001, SOC 2, and PCI DSS auditors -with clear remediation guidance for every finding.

Frequently Asked Questions

What is the OWASP Top 10?

The OWASP Top 10 is a regularly updated list of the ten most critical web application security risks, published by the Open Web Application Security Project. It is the most widely cited web application security standard in the world and is referenced by ISO 27001, SOC 2, PCI DSS, and HIPAA as a framework for secure development practices.

What is the most common OWASP vulnerability?

Broken Access Control (A01) has been the number one OWASP vulnerability since the 2021 edition and remains at the top in 2025. It was found in 94% of applications tested. It includes IDOR, missing function-level access control, privilege escalation, and CORS misconfigurations.

What changed in the OWASP Top 10 2025 edition?

The 2025 OWASP Top 10 elevates Server-Side Request Forgery (SSRF) to a standalone A10 category, adds SBOM requirements to the Vulnerable and Outdated Components category, and introduces specific guidance on AI-generated code security risks for the first time, reflecting the widespread adoption of LLM coding assistants.

How does the OWASP Top 10 relate to compliance frameworks?

ISO 27001 Annex A.8.25-A.8.31 requires secure application development practices -OWASP provides the technical reference. SOC 2 CC8.1 requires secure coding practices. PCI DSS Requirement 6.2 explicitly references OWASP as a source of secure coding guidelines. Demonstrating that your SDLC addresses OWASP Top 10 categories is strong evidence for all three frameworks.

How should a development team implement OWASP Top 10 remediation?

Start by scanning existing applications with SAST tools and DAST tools to identify which OWASP categories are present. Prioritise by exploitability and business impact. Establish secure coding guidelines mapped to OWASP categories. Train developers on vulnerabilities most common in your stack. Integrate SAST into your CI/CD pipeline so new code is continuously scanned before merge.