Parasoft Logo

Discover TÜV-certified GoogleTest with Agentic AI for C/C++ testing!
Get the Details »

Geometric background with hints of blue and green

OWASP Compliance

OWASP compliance is critical to maintaining secure software in today’s digital landscape. The OWASP Top 10:2025 reflects the latest threat data, introducing two new categories and significant re-rankings based on analysis of over 175,000 CVE records and input from security practitioners worldwide.

What Is OWASP?

The nonprofit group Open Web Application Security Project® (OWASP) seeks to enhance software security. Development teams around the world and across industries turn to the OWASP Foundation for tools, resources, and training to protect their web applications from cyberattacks. Projects with community-driven initiatives are open for anybody to join.

Colorful graphic of an infinity loop atop a shield

Build Security Into Your DevOps Strategy

Read the Guide

What Is the OWASP Top 10?

Periodically, OWASP releases a list of the most pressing problems for the development community at large. These issues affect the overall security of projects, and the list illuminates the biggest threats.

The OWASP Top 10:2025 introduces two entirely new categories and consolidates one existing category, reflecting the modern threat landscape. Based on analysis of over 175,000 CVE records, practitioner surveys, security vendor counsel, bug bounties, and community input, OWASP created its 2025 list with #1 being the most frequent and impactful issue. Ranked by severity and frequency, each item represents multiple common weakness enumerations (CWEs)—248 in total across the 10 categories.

The OWASP Top 10 helps teams focus on the most critical and likely problems before moving on to other issues.

All of these potential vulnerabilities pose significant threats to any development team but keep in mind that this is not an exhaustive list of everything that can go wrong during development. While the Top 10 isn’t a comprehensive strategy or the only method for identifying vulnerabilities, it is an excellent way to get started.

The Top 10 is most powerful when it works at both ends of development: teach developers to write secure code from the start and then use it to verify they did so.

With the development of APIs on the rise, OWASP also has a dedicated project focused solely on API security and its top ten concerning vulnerabilities. The OWASP API Security Top 10 was introduced in 2019 and updated in 2023.

OWASP Top 10
Language

A01:2025 Broken Access Control

Broken Access Control remains #1 for the fourth consecutive assessment cycle. In its findings, OWASP reported that 100% of applications tested (up from 94%) contained this issue, now spanning 40 CWEs (up from 34 in 2021). In 2025, OWASP also absorbed server-side request forgery (SSRF) into this category, recognizing SSRF as a specific manifestation of improper access control.

The biggest CWEs related to this vulnerability are:

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
  • CWE-201: Insertion of Sensitive Information Into Sent Data
  • CWE-352: Cross-Site Request Forgery

What Is Broken Access Control?

This security vulnerability allows access to private resources for unauthorized users. Attackers can go around any security protocols in place to access sensitive systems and information.

What Is the Impact of Broken Access Control?

It remains the most common vulnerability on the OWASP Top 10. Weak authorization and authentication methods allow for this security risk. Broken access control encompasses 40 CWEs (expanded from 34 in 2021), including SSRF scenarios. It accounts for more issues in the OWASP survey than any other category.

A02:2025 Security Misconfiguration

Security Misconfiguration climbs to #2 in 2025, up from #5 in 2021, reflecting the explosion of cloud and containerized environments where configuration errors are increasingly common. 100% of the applications tested have some form of this problem.

What Are Security Misconfiguration?

Security misconfiguration happens when important security settings are missing, incorrect, misconfigured, or left as defaults, such as not resetting default passwords, enabling unnecessary features, or failing to harden cloud storage.

What Is the Impact?

Misconfigured systems, cloud services, and containers contribute to a large proportion of breaches. A notable example is the 2023 FAA NOTAM outage, linked to misconfiguration. Keeping configurations hardened, removing unused features, and regularly auditing infrastructure are critical countermeasures.

A03:2025 Software Supply Chain Failures

Software Supply Chain Failures is a new category in 2025, addressing risks from third-party components, open-source libraries, build pipelines, and distribution mechanisms. It’s a challenge to identify and represents a rapidly growing attack surface with five CWEs, including things like:

  • CWE-477 – Use of Obsolete Function
  • CWE-1104 – Use of Unmaintained Third-Party Components
  • CWE-1329 – Reliance on Component That Is Not Updateable
  • CWE-1395 – Dependency on Vulnerable Third-Party Component

What Are Software Supply Chain Failures?

These failures occur when software components, build pipelines, or delivery mechanisms are compromised or tampered with. Examples include packages from untrusted sources, insecure build scripts, and absent code signing or integrity verification.

What Is the Impact?

Attackers who compromise a supply chain component can affect thousands of downstream applications simultaneously. Notable examples include the SolarWinds attack. Supply chain attacks often evade CVE-based detection entirely—they are trust failures in processes, not bugs in code.

Prevention guidance:

  1. Verify digital signatures and checksums in update mechanisms.
  2. Use only trusted, monitored package registries.
  3. Audit build and deploy pipelines for integrity checks.

A04:2025 Cryptographic Failures

Cryptographic Failures moves to #4 in 2025, down from #2 in 2021, reflecting growing industry awareness—though it remains a critical risk. The name was updated from “Sensitive Data Exposure” in 2021 to emphasize root causes over symptoms.

What Are Cryptographic Failures?

A cryptographic failure is any situation where sensitive data is exposed because cryptography is missing, weak, misconfigured, or incorrectly implemented. Cryptographic failures often lead to data breaches. Examples include missing HTTP Strict Transport Security headers, weak algorithms, transmitting data in clear text, or poor key management.

What Is the Impact?

They can cause sensitive data breaches and system compromises. A public example of a cryptographic failure is the LinkedIn 2012 breach, where an unsalted SHA 1 password hashing allowed attackers to trivially crack millions of credentials after the database was stolen. Preventing such failures requires proper cryptographic design, secure code, thorough testing, and integrating security into DevSecOps workflows.

  • Use strong, modern encryption algorithms (AES-256, TLS 1.3).
  • Enforce proper key management and rotation policies.
  • Never transmit sensitive data in clear text.

A05: Injection

Injection drops to #5 in 2025, down from #3 in 2021—a continued decline from its decade-long reign as the #1 risk, reflecting industry progress in input validation. It remains highly dangerous and widespread.

What Are Injection Issues?

Injection flaws occur when attackers send crafted data that forces an application to run unintended commands. For example, SQL injection can extract or alter entire databases. This includes cross-site scripting (XSS) and other injection types.

What Is the Impact?

Injection remains one of the most common and preventable vulnerability classes. OWASP testing data shows over 1.4 million observed injection occurrences across applications. Strict input validation, parameterized queries, and the use of safe APIs that separate data from commands can largely prevent these flaws. Common CWEs include CWE 79 (Cross Site Scripting) and CWE 89 (SQL Injection), with additional injection risks appearing in areas such as command, path, and expression handling.

A06:2025 Insecure Design

Insecure Design slides from #4 to #6 in 2025, reflecting gradual adoption of secure design principles—though design-level flaws remain a significant and often underappreciated risk.

What Is Insecure Design?

Insecure design happens when teams fail to anticipate threats during the architecture phase. Unlike implementation bugs, it reflects broader design flaws. For example, missing authorization steps in a workflow or weak password-reset flows.

What Is the Impact?

Insecure design makes applications vulnerable even when implementations seem secure. OWASP recommends integrating threat modeling, secure design patterns, and paved-road libraries early in the SDLC before writing a single line of code.

A07:2025 Authentication Failures

Authentication Failures remains at #7 in 2025. The name is streamlined from “Identification and Authentication Failures” (2021) to “Authentication Failures,” sharpening the focus on credential and session security.

What Are They?

These failures occur when login credentials, session IDs, or permissions aren’t handled securely—for instance, storing passwords in plain text or hard-coding credentials.

What Is the Impact?

The impact of A07:2025 failures is account takeover and identity impersonation, allowing attackers to bypass all downstream security controls, leading to data breaches, fraud, privilege escalation, and full system compromise. Multi-factor authentication and stronger password policies can mitigate risks.

A08:2025 Software and Data Integrity Failures

A08:2025 covers failures where applications trust software updates, code, or data without verifying their integrity, allowing untrusted or tampered artifacts—such as updates, dependencies, CI/CD artifacts, or serialized data—to be treated as legitimate and executed. The name updates from “and” to “or” reflect that software or data integrity may each be compromised independently.

What Are They?

Examples include insecure software updates, unprotected CI/CD pipelines, and unvalidated auto-updates.

What Is the Impact?

They open the door to attackers inserting malicious code. Notable concerns include insecure deserialization, a common path for denial-of-service and remote code execution. Large A08 failures include CCleaner’s signed malware update, malicious open source package takeovers like event stream, and insecure deserialization exploits, where tampered software or data was trusted and executed without integrity verification.

A09:2025 Security Logging and Alerting Failures

Security Logging and Alerting Failures remains at #9 in 2025. The name updates from “Monitoring Failures” to “Alerting Failures. Inadequate logging and alerting prevent timely detection, response, or investigation of security incidents.

What Are They?

These failures occur when systems don’t properly detect, alert on, or respond to threats. As environments grow more complex (microservices, containers, and cloud), integrated alerting is critical, not just passive logging.

What Is the Impact?

Without proper alerting, security incidents go undetected for extended periods, leading to breaches. Regulations like HIPAA and PCI DSS require proper logging. Poor alerting also amplifies other vulnerabilities, like broken access control, by removing the ability to detect and respond quickly. Notable failures include the Target and Equifax breaches, where inadequate logging, monitoring, or alerting allowed attackers to operate undetected for extended periods, dramatically increasing impact.

A10:2025 Mishandling of Exceptional Conditions

Mishandling of Exceptional Conditions is a new category in 2025. It highlights a long-overlooked class of risk: applications that fail unsafely when faced with unexpected inputs, resource shortages, timeouts, or internal errors.

Note: Server-Side Request Forgery (SSRF), previously A10:2021, has been absorbed into A01:2025 Broken Access Control.

What Is Mishandling of Exceptional Conditions?

Poor exception handling can leak sensitive data like stack traces or API keys, bypass access controls through fail-open logic, or trigger denial-of-service. These flaws often evade standard vulnerability scans because they manifest only under stress conditions. The category consolidates 24 CWEs, including CWE-209 (error messages exposing sensitive data), CWE-476 (NULL pointer dereference), and CWE-636 (fail-open logic).

What Is the Impact?

50% of OWASP survey respondents ranked this as their #1 emerging security concern. Applications should define secure failure modes (fail closed, deny access on error) and use consistent error-handling frameworks that log details internally while returning generic messages externally.

Key CWEs and prevention:

  • Define secure failure modes: fail closed and deny access on error.
  • Use consistent error-handling frameworks across the codebase.
  • Log error details internally—return only generic messages externally.

How Parasoft Helps Achieve OWASP Compliance

Parasoft’s comprehensive support for OWASP, including the OWASP Top 10:2025, helps users achieve DevSecOps by enforcing security-oriented development practices from the start of project development.

With the Parasoft solution, you get:

blue icon with triangle and explanation point in the center

Out-of-the-box policy/test configurations that are fully configurable.

Icon inside a blue circle showing three white arrows forming a continuous circle.

Standards-native reporting based on OWASP or CWE ID numbers.

Blue circle with a white icon in the center that shows test data and a check mark

Guidance on how to fix vulnerabilities with supported documentation and training content.

blue icon with triangle and explanation point in the center

Unique real-time feedback that gives users a continuous view of compliance with OWASP and remediation support to better identify and eliminate threat vectors.

Icon inside a blue circle showing three white arrows forming a continuous circle.

Execution from within the IDE and via the CI/CD process to help quickly locate the vulnerability earlier in the SDLC.

Blue circle with a white icon in the center that shows test data and a check mark

Interactive reports and customizable dashboards, which include exploitability, the prevalence in the field, detectability, and the impact of failure with AI-enhanced automation to help users prioritize and minimize manual triage.

Elevate your software testing
with Parasoft solutions.

Trials & Demos