Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Two New Web Application Risk Categories Added to OWASP Top 10

Posted on November 10, 2025November 10, 2025 By CWS

The Open Net Software Safety Undertaking (OWASP) has launched a revised model of its Prime 10 record of crucial dangers to net functions, including two new classes and reshuffling the general record order.

This 2025 launch candidate, which is a near-final draft of the flagship OWASP Prime 10 record, is open for remark till November 20. 

Damaged Entry Management has maintained the main place on the 2025 OWASP Prime 10 record, after climbing there in 2021. The Damaged Entry Management class now incorporates server-side request forgery (SSRF), which was beforehand separate and tenth on the record.

Safety Misconfiguration is now second on the record, up from fifth within the 2021 OWASP Prime 10, adopted by Software program Provide Chain Failures, an enlargement of Susceptible and Outdated Parts, which was beforehand sixth.

The expanded class contains “a broader scope of compromises occurring inside or throughout all the ecosystem of software program dependencies, construct techniques, and distribution infrastructure,” OWASP notes, mentioning that it emerged as a prime concern in the neighborhood survey.

The Cryptographic Failures, Injection (which incorporates XSS and SQL Injection), and Insecure Design classes every dropped two locations and at the moment are in fourth, fifth, and sixth positions, respectively.

Authentication Failures, Software program or Information Integrity Failures, and Logging & Alerting Failures maintained the seventh, eighth, and ninth spots that they had on the 2021 OWASP Prime 10.

New to the record is the Mishandling of Distinctive Situations class, now on tenth place. It contains failing open, improper error dealing with, logical errors, and different eventualities related to irregular situations techniques could encounter.

In line with OWASP, a few of the classes on this installment of the record have been modified in comparison with 2021, primarily as a result of a barely completely different strategy.Commercial. Scroll to proceed studying.

“On this iteration, we requested for information, with no restriction on CWEs like we did for the 2021 version. We requested for the variety of functions examined for a given yr (beginning in 2021), and the variety of functions with at the least one occasion of a CWE present in testing. This format permits us to trace how prevalent every CWE is throughout the inhabitants of functions,” OWASP explains.

The group centered on the foundation trigger and ignored the frequency of a CWE throughout the identical utility, and used a pool of 589 CWEs for evaluation, in comparison with 30 CWEs in 2017 and almost 400 CWEs in 2021.

“We plan to do extra information evaluation as a complement sooner or later. This vital enhance within the variety of CWEs necessitates adjustments to how the classes are structured,” OWASP notes.

Nonetheless, the workforce used CVE information for Exploitability and (Technical) Affect, and calculated common exploit and affect scores by grouping CVEs with CVSS scores by CWE and looking out on the proportion of functions that had CVSSv3 and CVSSv2 scores.

Because of the limits of automated testing, solely eight classes have been chosen from this information, which is taken into account incomplete. The opposite two classes come from the Prime 10 group survey, through which practitioners vote for what they think about the best dangers.

Associated: MITRE Unveils ATT&CK v18 With Updates to Detections, Cellular, ICS

Associated: MITRE Unveils AADAPT Framework to Sort out Cryptocurrency Threats

Associated: MITRE Updates Record of Most Frequent {Hardware} Weaknesses

Associated: MITRE Updates Record of 25 Most Harmful Software program Vulnerabilities

Security Week News Tags:Added, Application, Categories, OWASP, Risk, Top, Web

Post navigation

Previous Post: Critical Vulnerability in Popular NPM Library Exposes AI and NLP Apps to Remote Code Execution
Next Post: Runc Vulnerabilities Can Be Exploited to Escape Containers

Related Posts

Hackers Target Popular Nx Build System in First AI-Weaponized Supply Chain Attack Security Week News
Coinbase Says Rogue Contractor Data Breach Affects 69,461 Users Security Week News
Qantas Hit with Extortion Demand After Data Breach Security Week News
Organizations Warned of Exploited Meteobridge Vulnerability Security Week News
Fraud Prevention Firm Resistant AI Raises $25 Million Security Week News
1Kosmos Raises $57 Million for Identity Verification and Authentication Platform Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins
  • Many Forbes AI 50 Companies Leak Secrets on GitHub
  • Chinese Cybersecurity Firm Data Breach Exposes State-Sponsored Hackers Cyber Weapons and Target List
  • OWASP Top 10 2025 – Revised Version Released With Two New Categories
  • Runc Vulnerabilities Can Be Exploited to Escape Containers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins
  • Many Forbes AI 50 Companies Leak Secrets on GitHub
  • Chinese Cybersecurity Firm Data Breach Exposes State-Sponsored Hackers Cyber Weapons and Target List
  • OWASP Top 10 2025 – Revised Version Released With Two New Categories
  • Runc Vulnerabilities Can Be Exploited to Escape Containers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News