The OWASP Foundation has published the release candidate for its highly anticipated 2025 Top 10 list, providing a crucial update to the industry-standard awareness document for web application security. The new list reflects the modern, complex nature of software development, introducing a brand-new category, A03: Software Supply Chain Failures, to address the growing threat from compromised dependencies. Another new entry, A10: Mishandling of Exceptional Conditions, focuses on the risks of improper error handling. A01: Broken Access Control continues to hold the top spot as the most critical risk, while A02: Security Misconfiguration has risen to second place, highlighting the persistent challenge of securing complex cloud and application environments. The 2025 update encourages a strategic shift in AppSec, urging organizations to focus on secure design principles and systemic weaknesses rather than just individual vulnerabilities.
The OWASP Top 10 is not a formal regulation but serves as a de facto standard for web application security. Many compliance frameworks, such as PCI DSS, reference it. The 2025 list introduces significant changes from the 2021 version:
The 2025 OWASP Top 10 List (Release Candidate):
A03: Software Supply Chain Failures elevates the risk of using vulnerable or malicious third-party components. A10: Mishandling of Exceptional Conditions targets risks from unhandled errors that can leak information or cause denial-of-service.Security Misconfiguration's jump to #2 reflects the widespread issues with insecure defaults, verbose error messages, and improperly configured cloud services.Broken Access Control.The OWASP Top 10 is relevant to any organization that develops, maintains, or procures software. This includes:
The shift in the OWASP Top 10 signals a necessary evolution in how organizations must approach application security:
Insecure Design, Security Misconfiguration). This requires a 'shift-left' approach, integrating security into the entire software development lifecycle (SDLC).A03 category forces organizations to take responsibility for the security of their entire dependency tree. This necessitates the use of Software Composition Analysis (SCA) tools and the creation of Software Bills of Materials (SBOMs).Broken Access Control and Security Misconfiguration reflects the challenges of securing modern, API-driven, and cloud-hosted applications.To align with the principles of the new OWASP Top 10, organizations should:
Insecure Design flaws before a single line of code is written.Directly addresses 'A02: Security Misconfiguration' by requiring secure defaults and configuration hardening.
Mapped D3FEND Techniques:
A key mitigation for 'A03: Software Supply Chain Failures' is to keep all third-party components and dependencies patched.
Mapped D3FEND Techniques:
Helps mitigate 'A01: Broken Access Control' by enforcing network-level access restrictions in addition to application-level ones.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats