Organizational project OWASP (Open Web Application Security Project) has for many years published the Top 10 list of the most critical web application security risks. It serves as a key reference point for developers, auditors, DevSecOps operations, and IT departments. The version OWASP Top 10 2021 has been widely adopted and is becoming a foundation for coding, testing, deployment, and monitoring security standards.
Due to the rapidly changing threat landscape (microservices, API-first, cloud, CI/CD, DevSecOps model, and elements of generative artificial intelligence), OWASP is preparing a new release of the list for 2025 (currently in the Release Candidate phase).
Below we present:
Table of Contents
ToggleThe table below shows the 10 categories from the 2021 version:
| Code | Category | Short explanation |
|---|---|---|
| A01:2021 | Broken Access Control | Violation of access control mechanisms – users perform actions or gain access they are not authorized for. |
| A02:2021 | Cryptographic Failures | Errors in cryptographic implementation (weak algorithms, bad keys, lack of data protection in transit/at rest) – formerly “Sensitive Data Exposure.” |
| A03:2021 | Injection | Injection of code/commands (SQL, OS, LDAP, XSS, etc.). In the 2021 version, XSS was included in this category. |
| A04:2021 | Insecure Design | New in 2021 – focuses on design-level issues, threat modeling, and secure architecture patterns. |
| A05:2021 | Security Misconfiguration | Configuration errors such as default passwords, open ports, or improper server/application settings. |
| A06:2021 | Vulnerable and Outdated Components | Use of components/libraries/frameworks with known vulnerabilities or lacking vendor support. |
| A07:2021 | Identification and Authentication Failures | Flaws in authentication and identification – weak passwords, lack of MFA, improper session handling. |
| A08:2021 | Software and Data Integrity Failures | Integrity violations of data/applications – e.g., unverified updates, missing code validation in CI/CD. |
| A09:2021 | Security Logging and Monitoring Failures | Lack of or improper logging and monitoring, making incident detection and response difficult. |
| A10:2021 | Server-Side Request Forgery (SSRF) | The application performs HTTP/HTTPS requests on behalf of a user without proper validation, allowing access to internal resources. |
Key changes compared to previous editions:
For DevSecOps teams, the 2021 list remains a foundational reference (secure coding guidelines, pentesting, audits) – but it is already time to prepare for the upcoming changes.
Although the final OWASP Top 10 2025 version has not yet been officially released (as of September/October 2025), the project’s site presents the following draft list (RC):
| Code | Category |
|---|---|
| A01:2025 | Broken Access Control |
| A02:2025 | Security Misconfiguration |
| A03:2025 | Software Supply Chain Failures |
| A04:2025 | Cryptographic Failures |
| A05:2025 | Injection |
| A06:2025 | Insecure Design |
| A07:2025 | Authentication Failures |
| A08:2025 | Software or Data Integrity Failures |
| A09:2025 | Logging and Alerting Failures |
| A10:2025 | Mishandling of Exceptional Conditions |
(Source: OWASP Top Ten 2025 RC1)
Below are key differences and implications:
| Aspect | What changed | Why it matters in practice |
|---|---|---|
| Priority/Position | In 2021, “Broken Access Control” was #1; in 2025, it remains #1 – showing persistent risk. | Teams should continue to prioritize authorization, now considering cloud and API-driven architectures. |
| Category changes | New “Software Supply Chain Failures” (#3 in 2025), absent in 2021. | Teams must focus on dependency management (libraries, containers, CI/CD pipelines). |
| Renaming and scope | “Authentication Failures” replaces “Identification and Authentication Failures”; “Logging and Alerting” replaces “Logging and Monitoring.” | Reflects differentiation between monitoring and real-time alerting processes. |
| New vectors | “Mishandling of Exceptional Conditions” highlights edge-case and microservice/AI-related exception management issues. | Requires architectural review of fallback and exception-handling logic. |
| “Shift-left” and design | “Insecure Design” remains, but lower-ranked – now considered a standard expectation. | Integrate security earlier in design rather than just testing stages. |
| Configuration & operations | “Security Misconfiguration” moves higher – operational configuration remains a major weak point. | Should be part of continuous monitoring and production audits (including CI/CD). |


Based on the above analysis, we suggest that IT/development teams adopt the following actions:
The OWASP Top 10 2021 list remains a solid foundation (and should be treated as a minimum standard), but the 2025 edition stands out for extending its scope beyond code – encompassing the entire application ecosystem: artifacts, dependencies, operations, pipelines, exceptions, and logging/alerting. For IT teams, this means elevating the perspective – from “Is the code secure?” to “Is the entire process and runtime environment resilient and monitored?”