OWASP Web Top 10
The 10 most critical security risks for web applications, defined by the Open Web Application Security Project. These are the vulnerabilities attackers exploit most often.
10 vulnerabilities
Broken Access Control
highUsers can act outside their intended permissions, accessing other users' data or admin functionality without proper authorization checks.
Cryptographic Failures
highSensitive data is exposed due to weak or missing encryption — using outdated algorithms like MD5/SHA1, storing passwords in plaintext, or transmitting data without TLS.
Supply Chain Failures
mediumYour application inherits vulnerabilities from third-party dependencies — outdated packages with known CVEs that attackers actively exploit.
Security Misconfiguration
mediumDefault configurations, open CORS policies, debug mode in production, or verbose error messages expose your application to attackers.
Injection (SQL, NoSQL, Command)
criticalAttacker inserts malicious code into queries or commands by exploiting unsanitized user input — SQL injection, NoSQL injection, and OS command injection.
Insecure Design
mediumThe application's architecture has fundamental security flaws — business logic on the client side, missing server-side validation, or no threat modeling.
Authentication Failures
highWeak authentication mechanisms allow attackers to compromise passwords, keys, or session tokens — JWT without expiration, tokens stored in localStorage, or missing MFA.
Data Integrity Failures
mediumApplications that don't verify the integrity of data, software updates, or CI/CD pipelines are vulnerable to tampering — insecure deserialization and unsigned updates.
Security Logging Failures
lowMissing or insufficient logging of security events like failed logins, access violations, and data changes makes it impossible to detect and respond to attacks.
Server-Side Request Forgery (SSRF)
highAttacker tricks the server into making requests to internal resources — accessing cloud metadata, internal APIs, or services that should not be publicly reachable.