On November 6th, the Open Worldwide Application Security Project announced the release candidate for the 2025 edition of their famous OWASP Top 10. In this post, we'll take you through the highlights of what's new in this edition.
Keep in mind that the new edition is still a release candidate. We do not expect any major changes in the final version, but some of the details might still change before the final version is released.
What is the OWASP Top 10?
OWASP's Top 10 list of Web Application Security Risks is a list of the most critical security risks for web applications, based on data from a wide range of organisations and security experts. It serves as a guide for developers, security professionals, and organisations to prioritise their security efforts and has become the most well-known awareness document for web application security.
Since its first release in 2003, the Top 10 has been regularly updated to reflect the evolving threat landscape. The previous edition was released in 2021, and now, in 2025, we have a new version that brings several changes and updates.
So what's new?
- The entry for "Server-Side Request Forgery" has been merged into "Broken Access Control". Broken Access Control remains at the top of the list as the number one most critical web application security risk.
- "Security Misconfiguration" moves up from position 5 to position 2, reflecting its continued prevalence and impact on web application security. For cloud and infrastructure security, this category is the number one risk due to leaked credentials, which is the top security misconfiguration.
- Previously at number 6, "Vulnerable and Outdated Components" has been moved up to number 3 and has been expanded and renamed to "Software Supply Chain Failures", reflecting the growing importance of supply chain security. Supply chain attacks are increasing in frequency and can be very costly. In OWASP’s community survey, 50% of respondents ranked this risk at number one. Some well-known examples of supply chain attacks are the SolarWinds attack, Log4Shell, PhantomRaven, and XZ Utils.
- The return of an old friend: "Mishandling of Exceptional Conditions" comes in at number 10. This was originally part of the Top 10 in 2003 as "Error Handling Problems". Its return indicates a rise in applications that do not treat exceptional conditions with due care, leading to potential security vulnerabilities.
- "Security Logging and Monitoring Failures" has been renamed to "Logging & Alerting Failures", emphasizing the importance of not just logging security events but also generating actionable alerts.
There are several other changes in order or terminology, see the graphic below for the changes: