OWASP Top 10
|

OWASP Top 10 for 2025: What’s New in Web Application Security

Web application security continues to dominate conversations in cybersecurity and for good reasons. As web applications grow in scope and complexity, vulnerabilities become increasingly difficult to manage, making this a persistent challenge for organizations everywhere.

The Open Web Application Security Project (OWASP) remains the industry leader in identifying and classifying these threats. Their newly released OWASP Top 10 for 2025 replaces the 2021 list, bringing with it a mix of re-ranked, redefined, and newly introduced risks.

In this post, we’ll break down what’s changed, what stayed familiar, and how your teams can start preparing for the next evolution of application security and the risks on the horizon for 2026.

What Has Changed?

OWASP’s latest update refines and reshuffles the risk categories to reflect the modern web ecosystem. While some long-standing issues persist, others have broadened to capture new supply-chain and configuration-driven challenges. Here’s a quick overview:

A01:2025 – Broken Access Control

Still the number one threat. It continues to be the most prevalent and dangerous issue across modern applications.

A02:2025 – Security Misconfiguration

Previously fifth, now takes second place due to the explosion of configuration-driven vulnerabilities in cloud and containerized environments.

A03:2025 – Software Supply Chain Failures

Formerly “Vulnerable and Outdated Components,” this expanded category has moved up in the list and now covers the entire software supply chain dependencies, build systems, and distribution infrastructure.

A04:2025 – Cryptographic Failures

Dropping slightly in rank, this category still highlights the ongoing risks of weak or broken encryption and exposure of sensitive data.

A05:2025 – Injection

Once in third, injection flaws remain widespread, with SQL, NoSQL, and command injections still driving a large portion of reported CVEs.

A06:2025 – Insecure Design

Insecure design moves down from the fourth position as threat modeling and an emphasis on secure design have led to improvements in this risk over the last four years.

A07:2025 – Authentication Failures

Previously “Identification and Authentication Failures.” Modern authentication frameworks have reduced these risks, but they remain a consistent area of concern.

A08:2025 – Software or Data Integrity Failures

Unchanged from 2021, this continues to cover failures in verifying software and data integrity across deployment pipelines.

A09:2025 – Logging and Alerting Failures

Slightly renamed from “Security Logging and Monitoring Failures” to emphasize the importance of real-time alerting and incident response readiness, this category also remains in the same position as the 2021 list.

A10:2025 – Mishandling of Exceptional Conditions

A new category that replaces “Server-Side Request Forgery (SSRF).” It focuses on improper error handling, logic flaws, and unexpected application behavior.

What Should Your Organization Do Next?

Now is the perfect time to review your organization’s web application risk posture. Conduct a new risk assessment to determine which of these updated vulnerabilities apply to your systems and partner with your development and security teams to implement proactive controls.

Raxis offers a number of options to help organizations keep web applications aligned with the OWASP Top 10. Our expert team can identify and exploit real-world vulnerabilities in your applications before attackers do. Add Raxis Attack PTaaS to your DevSecOps processes for continual testing of your applications or choose a traditional Raxis Strike penetration test to verify your controls annually and after major updates.

Similar Posts