OWASP Top 10 for 2025 Released, Spotlighting Supply Chain and Design Flaws

OWASP Publishes 2025 Top 10 Release Candidate, Introducing 'Software Supply Chain Failures' as a Major New Risk Category

INFORMATIONAL
November 10, 2025
4m read
Security OperationsPolicy and ComplianceSupply Chain Attack

Related Entities

Organizations

Full Report

Executive Summary

The OWASP Foundation has published the release candidate for its highly anticipated 2025 Top 10 list, providing a crucial update to the industry-standard awareness document for web application security. The new list reflects the modern, complex nature of software development, introducing a brand-new category, A03: Software Supply Chain Failures, to address the growing threat from compromised dependencies. Another new entry, A10: Mishandling of Exceptional Conditions, focuses on the risks of improper error handling. A01: Broken Access Control continues to hold the top spot as the most critical risk, while A02: Security Misconfiguration has risen to second place, highlighting the persistent challenge of securing complex cloud and application environments. The 2025 update encourages a strategic shift in AppSec, urging organizations to focus on secure design principles and systemic weaknesses rather than just individual vulnerabilities.


Regulatory Details: The OWASP Top 10 2025 Release Candidate

The OWASP Top 10 is not a formal regulation but serves as a de facto standard for web application security. Many compliance frameworks, such as PCI DSS, reference it. The 2025 list introduces significant changes from the 2021 version:

The 2025 OWASP Top 10 List (Release Candidate):

  1. A01: Broken Access Control (Previously #1)
  2. A02: Security Misconfiguration (Previously #5)
  3. A03: Software Supply Chain Failures (New Category)
  4. A04: Injection (Previously #3)
  5. A05: Insecure Design (Previously #4)
  6. A06: Cryptographic Failures (Previously #2, renamed from 'Sensitive Data Exposure')
  7. A07: Authentication Failures (Consolidates previous 'Broken Authentication')
  8. A08: Software and Data Integrity Failures (Previously #8)
  9. A09: Security Logging and Monitoring Failures (Previously #9)
  10. A10: Mishandling of Exceptional Conditions (New Category)

Key Changes and Mergers:

  • New Categories: The introduction of A03: Software Supply Chain Failures elevates the risk of using vulnerable or malicious third-party components. A10: Mishandling of Exceptional Conditions targets risks from unhandled errors that can leak information or cause denial-of-service.
  • Promoted Risks: Security Misconfiguration's jump to #2 reflects the widespread issues with insecure defaults, verbose error messages, and improperly configured cloud services.
  • Consolidated Categories: Server-Side Request Forgery (SSRF), which had its own category in 2021, is now considered a subset of Broken Access Control.

Affected Organizations

The OWASP Top 10 is relevant to any organization that develops, maintains, or procures software. This includes:

  • Web and application developers
  • DevOps and DevSecOps engineers
  • Cybersecurity professionals, including penetration testers and security architects
  • Chief Information Security Officers (CISOs) and technology leaders
  • Product managers and business owners

Impact Assessment

The shift in the OWASP Top 10 signals a necessary evolution in how organizations must approach application security:

  • Focus on Root Cause: The list moves beyond specific bug classes (like XSS) to broader, systemic issues (Insecure Design, Security Misconfiguration). This requires a 'shift-left' approach, integrating security into the entire software development lifecycle (SDLC).
  • Supply Chain is Paramount: The new A03 category forces organizations to take responsibility for the security of their entire dependency tree. This necessitates the use of Software Composition Analysis (SCA) tools and the creation of Software Bills of Materials (SBOMs).
  • API and Cloud Security: The prominence of Broken Access Control and Security Misconfiguration reflects the challenges of securing modern, API-driven, and cloud-hosted applications.

Compliance Guidance

To align with the principles of the new OWASP Top 10, organizations should:

  1. Adopt a Secure SDLC: Integrate security activities into every phase of development, from threat modeling during design to security testing in CI/CD pipelines.
  2. Implement Software Composition Analysis (SCA): Use SCA tools to continuously scan dependencies for known vulnerabilities. Maintain an up-to-date SBOM for all applications.
  3. Automate Security Testing: Integrate Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Interactive Application Security Testing (IAST) into the development process.
  4. Prioritize Threat Modeling: Regularly conduct threat modeling exercises during the design phase to identify and mitigate potential Insecure Design flaws before a single line of code is written.
  5. Harden Configurations: Develop and enforce security configuration standards for all applications, servers, and cloud services. Use Infrastructure as Code (IaC) scanning to detect misconfigurations before deployment.

Timeline of Events

1
November 10, 2025
This article was published
2
November 20, 2025
Deadline for public comments on the OWASP Top 10 2025 release candidate.
3
January 1, 2026
The final version of the OWASP Top 10 2025 is expected to be published.

MITRE ATT&CK Mitigations

Directly addresses 'A02: Security Misconfiguration' by requiring secure defaults and configuration hardening.

Mapped D3FEND Techniques:

A key mitigation for 'A03: Software Supply Chain Failures' is to keep all third-party components and dependencies patched.

Mapped D3FEND Techniques:

Helps mitigate 'A01: Broken Access Control' by enforcing network-level access restrictions in addition to application-level ones.

Mapped D3FEND Techniques:

Sources & References

OWASP Top Ten
OWASP Foundation (owasp.org)
owasp top 10: 2025 updates - noailabs
Noa Labs (noailabs.com) November 7, 2025
OWASP Top 10 2025 – The Complete Guide - Reflectiz
Reflectiz (reflectiz.com) November 7, 2025
OWASP Top 10:2025 RC1
OWASP Foundation (owasp.org)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

OWASPOWASP Top 10Application SecurityAppSecDevSecOpsSupply Chain SecurityInsecure Design

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading