OWASP Web Top 10

The 10 most critical security risks for web applications, defined by the Open Web Application Security Project. These are the vulnerabilities attackers exploit most often.

10 vulnerabilities

Broken Access Control

high

Users can act outside their intended permissions, accessing other users' data or admin functionality without proper authorization checks.

CWE-284A01:2021

Cryptographic Failures

high

Sensitive data is exposed due to weak or missing encryption — using outdated algorithms like MD5/SHA1, storing passwords in plaintext, or transmitting data without TLS.

CWE-327A02:2021

Supply Chain Failures

medium

Your application inherits vulnerabilities from third-party dependencies — outdated packages with known CVEs that attackers actively exploit.

CWE-1395A06:2021

Security Misconfiguration

medium

Default configurations, open CORS policies, debug mode in production, or verbose error messages expose your application to attackers.

CWE-16A05:2021

Injection (SQL, NoSQL, Command)

critical

Attacker inserts malicious code into queries or commands by exploiting unsanitized user input — SQL injection, NoSQL injection, and OS command injection.

CWE-89A03:2021

Insecure Design

medium

The application's architecture has fundamental security flaws — business logic on the client side, missing server-side validation, or no threat modeling.

CWE-840A04:2021

Authentication Failures

high

Weak authentication mechanisms allow attackers to compromise passwords, keys, or session tokens — JWT without expiration, tokens stored in localStorage, or missing MFA.

CWE-287A07:2021

Data Integrity Failures

medium

Applications that don't verify the integrity of data, software updates, or CI/CD pipelines are vulnerable to tampering — insecure deserialization and unsigned updates.

CWE-502A08:2021

Security Logging Failures

low

Missing or insufficient logging of security events like failed logins, access violations, and data changes makes it impossible to detect and respond to attacks.

CWE-778A09:2021

Server-Side Request Forgery (SSRF)

high

Attacker tricks the server into making requests to internal resources — accessing cloud metadata, internal APIs, or services that should not be publicly reachable.

CWE-918A10:2021