Back to Blog
SecurityFebruary 15, 20267 min read

OWASP Top 10 2025: What Changed and Why It Matters for Your AppSec Program

Security Misconfiguration jumped to #2. SSRF earned its own top-level category. AI-generated code risks are formally addressed for the first time. Here is the complete breakdown of the 2025 update and its operational implications.

The OWASP Top 10 2025 update landed with several significant structural changes. If your security program is still calibrated to the 2021 list, here's what needs to change — and why.

The 2025 List at a Glance

RankCategoryChange from 2021
A01Broken Access ControlNo change (held #1 since 2021)
A02Security MisconfigurationUp from #5
A03InjectionDown from #3
A04Insecure DesignNo change
A05Vulnerable & Outdated ComponentsExpanded (now includes SBOM)
A06Identification & Authentication FailuresRenamed
A07Software & Data Integrity FailuresNo change
A08Security Logging & Monitoring FailuresNo change
A09Server-Side Request ForgeryNow standalone (was part of A10)
A10Emerging Technology RisksNew (LLM/AI security)

The Three Most Significant Shifts

1. Security Misconfiguration Jumps to #2

This is the most operationally significant change. Misconfiguration climbing from #5 to #2 reflects a statistical reality: cloud infrastructure has made misconfiguration the most prevalent actual attack vector, even if injection remains conceptually critical.

The 2025 definition explicitly expands misconfiguration to include:

Operational implication: If your security scan covers injection but doesn't systematically audit HTTP headers and cloud storage permissions, you are now missing the #2 most common attack vector.

2. SSRF Gets Its Own Category (A09)

Server-Side Request Forgery was previously bundled under "other" categories. The 2025 list gives it standalone status — a recognition that SSRF has become a primary attack vector for cloud credential theft and internal service discovery.

The canonical SSRF attack against cloud infrastructure:

Attacker crafts request → Application fetches internal URL
→ AWS metadata endpoint (169.254.169.254)
→ Returns IAM credentials
→ Attacker has AWS access

This attack pattern has been used in several high-profile breaches. The elevation to a standalone OWASP category reflects how widespread cloud deployments have made it.

Operational implication: Your DAST scanner must actively probe for SSRF by injecting cloud metadata URLs and internal addresses into every URL parameter, form field, and JSON property. Passive scanning does not detect SSRF.

3. Emerging Technology Risks — AI Code and LLM Security

For the first time, OWASP formally addresses security risks introduced by AI-generated code and LLM integration. A10 2025 covers:

AI-generated code risks:

LLM integration risks:

Operational implication: If your development team uses Copilot, Cursor, or similar tools, your code review process needs an explicit security review gate for AI-generated code. Automated SAST must run on all committed code regardless of origin.

What Did NOT Change (and Why That Matters)

Broken Access Control Remains #1

Broken Access Control has held the top position since 2021. OWASP reports it appears in 94% of tested applications. The reason it doesn't move: it's both the most prevalent and the hardest to automatically detect.

If you have not invested in runtime authorization testing — testing that User A cannot access User B's resources — this should be your top security priority. Automated tools can assist but cannot replace testing against your application's specific authorization model.

Injection Moved Down, Not Away

Injection (SQL, XSS, command injection) dropped to A03. This reflects improved framework-level protection — ORMs, prepared statements, and template escaping have reduced the raw count of injection vulnerabilities. It does not mean injection is solved.

Legacy codebases, custom SQL queries, and NoSQL injection remain significant attack surfaces. Every application with database queries should have active injection testing in its CI/CD pipeline.

Updating Your Security Program

Checklist for aligning your program with OWASP Top 10 2025:

The 2025 list is not a dramatic overhaul — it's a calibration to where breaches are actually occurring. If your security program already covers injection and XSS comprehensively, the work is to expand coverage into misconfiguration, SSRF, and emerging AI risks.


PentestCheck maps every finding to the relevant OWASP category. Your Threat Score reflects your current posture across all 10.

Scan your attack surface today

Free plan includes 3 targets and 10 scans/month. No credit card required.

Start Free Scan