OWASP Top 10 2025 RC1 Explained

What Is OWASP and Why It Matters for Web Application Security

OWASP, short for the Open Web Application Security Project, is a global nonprofit community of developers, cybersecurity experts, organizations, and academic institutions working together to enhance web application security. As a leading authority in the field, OWASP publishes widely accepted security documents—most notably the OWASP Top 10 and OWASP API Security Top 10. It also develops open-source security tools, guidelines, and educational resources to help organizations mitigate web-based threats.

As a top global cybersecurity company, Penta Security actively follows OWASP standards to align with the evolving needs of global cybersecurity.

owasp top 10 rc1

What Is the OWASP Top 10?

Among OWASP’s publications, the OWASP Top 10 stands out as the industry standard for web application security. This document provides a prioritized list of the most critical web application security risks, helping developers and cybersecurity professionals focus on the threats that demand immediate attention.

The OWASP Top 10 is updated every three to four years. The most recent finalized version was released in 2021, and the 2025 edition is now available as a Release Candidate (as of November 2025). These updates reflect the ever-changing threat landscape, incorporating new technologies, attack methods, and feedback from the global security community.

OWASP Top 10 for 2025: What’s New?

The OWASP Top 10 2025 Release Candidate includes the following security risks:

Compared to the 2021 list, only one brand-new threat category has been added. Most other changes involve broader categories that encompass newly emerging risks, emphasizing a shift in focus from external defenses to internal system design and trust validation.

Comparison: OWASP Top 10 2021 vs. 2025

OWASP Top 10 RC 1

 

Code Name Key Changes
A01:2025 Broken Access Control Remains the top threat, highlighting persistent challenges in access restrictions.
A02:2025 Security Misconfiguration Jumps from 5th to 2nd place due to increasingly complex and customizable deployment environments. Found in 3.00% of tested apps.
A03:2025 Software Supply Chain Failures A major new category that expands on 2021’s “Vulnerable and Outdated Components” by addressing threats across dependencies, build systems, and deployment infrastructure. Though rare, these failures can cause severe damage and topped community concern surveys.
A04:2025 Cryptographic Failures Drops from 2nd to 4th but remains critical due to risks of sensitive data exposure and system breaches.
A05:2025 Injection Drops two places, still includes risks like XSS and SQL Injection.
A06:2025 Insecure Design Declines from 4th to 6th. Introduced in 2021, this category reflects improvements in threat modeling and secure design practices.
A07:2025 Authentication Failures Holds steady in 7th place with slight name refinement. The rise in standardized authentication frameworks has helped reduce vulnerabilities.
A08:2025 Software or Data Integrity Failures Stays at 8th place, focusing on trust boundary failures and lack of integrity checks for code, software, and data artifacts.
A09:2025 Logging & Alerting Failures Also remains at 9th with an updated name. Now emphasizes the importance of alerting, not just logging. Often underestimated in data but ranked high by community votes.
A10:2025 Mishandling of Exceptional Conditions The only new addition. Covers 24 CWEs related to poor error handling, logic flaws, and data leaks under abnormal conditions.

How to Protect Against OWASP Top 10 Threats

The OWASP Top 10:2025 RC1 clearly signals a shift in web security—from simply defending against external attacks to emphasizing secure design and trust verification within the application itself.

Rather than wait for the final release, organizations should act now. Use the RC1 insights—especially around design (A06), configuration (A02), and supply chain (A03)—to reevaluate your security strategies and development workflows.

Cybersecurity is no longer optional. It is a competitive advantage. Web Application Firewalls (WAF/WAAP) and encryption platforms are essential front-line defenses, forming the foundation of a strong defense-in-depth strategy.

 


 

Click here to subscribe our Newsletter

Click here for inquiries regarding the partner system of Penta Security

 

Check out Penta Security’s product lines:

Web Application Firewall: WAPPLES

Database Encryption: D.AMO

 

Check out the product lines of  Cloudbric by Penta Security:

Cloud-based Fully Managed WAAP: Cloudbric WAF+

Agent based Zero Trust Network Access Solution: Cloudbric PAS

Agentless Zero Trust Network Access Solution: Cloudbric RAS

Click here for inquiries regarding the partner system of Cloudbric