Security: OWASP Top Ten 2025

The Open Web Application Security Project (OWASP) provides a top ten list of security risks in web applications, and the 2025 candidate list is now available. I previously wrote about the OWASP Top Ten back in 2022 with reference to the 2021 list, so how does the 2025 OWASP Top Ten compare?

PositionOWASP 2021OWASP 2025
01A01 Broken Access ControlA01 Broken Access Control
02A02 Cryptographic FailuresA02 Security Misconfiguration
03A03 InjectionA03 Software Supply Chain Failures
04A04 Insecure DesignA04 Cryptographic Failures
05A05 Security MisconfigurationA05 Injection
06A06 Vulnerable and Outdated ComponentsA06 Insecure Design
07A07 Identification and Authentication FailuresA07 Authentication Failures
08A08 Software and Data Integrity FailuresA08 Software or Data Integrity Failures
09A09 Security Logging and Monitoring FailuresA09 Logging and Alerting Failures
10A10 Server Side Request Forgery (SSRF)A10 Mishandling of Exceptional Conditions

Which OWASP Top Ten?

With the new candidate list out it may take some time for resources on the web to catch up. If a resource is referencing AXX:2021 (replacing XX with numbers 01-10) then it is the OWASP Top Ten 2021. If it’s AXX:2025 (replacing XX with numbers 01-10) then it is the OWASP Top Ten 2025. However, if resources don’t use the AXX:YEAR format then look at the naming, for example logging failures were “Security Logging and Monitoring Failures” in 2021 and are “Logging & Alerting Failures” in 2025.

The Climbers

A02:2025 Security Misconfiguration, previously A05:2021 Security Misconfiguration has climbed 3 places from #5 to #2.

A03:2025 Software Supply Chain Failures, expands A06:2021 Vulnerable and Outdated Components, and climbed 3 places from #6 to #3.

The Fallers

A04:2025 Cryptographic Failures, previously A02:2021 Cryptographic Failures, has fell two places from #2 to #4.

A05:2025 Injection, previously A03:2021 Injection, has fell two places from #3 to #5.

A06:2025 Insecure Design, previously A04:2021 Insecure Design, has fell two places from #4 to #6.

Where has Server-Side Request Forgery (SSRF) gone?

Server-Side Request Forgery (SSRF), previously A10:2021 in the 2021 list has bene merged into Broken Access Control, A01:2025 in the 2025 list.

What is the new category?

With SSRF merging into Broken Access Control a new category has entered the list. A10:2025 Mishandling of Exceptional Conditions has entered the 2025 list at #10. What is Mishandling of Exceptional Conditions? Examples include improper error handling, failing open and logical errors.

How To Test Web Application Security

Tooling such as the Zed Attack Proxy (ZAP), previously known as OWASP ZAP, can be used to scan web applications for security vulnerabilities. The OWASP Project also has a testing guide.

More Details

The OWASP site is the go to for details on the Top 10 2025, and for previous lists. The 2025 is the 8th release of the list, they are not released yearly.

Welcome to GeekTechStuff

My home away from home and where I will be sharing my adventures in the world of technology and all things geek.

The technology subjects have varied over the years from Python code to handle ciphers and Pig Latin, to IoT sensors in Azure and Python handling Bluetooth, to Ansible and Terraform and material around DevOps.

Let’s connect