Technology RadarTechnology Radar

OWASP Top 10 (Classic, 2025 Edition)

governancesast
Adopt

The eighth edition of OWASP's flagship web application security list, released January 2026, is based on analysis of 175,000+ CVEs and 500,000+ applications. AI-generated code is susceptible to all of these classic vulnerabilities — studies show it contains 15-18% more vulnerabilities than human-written code.

Key Changes in 2025

  • A01 - Broken Access Control — held #1 (3.73% of apps)
  • A02 - Security Misconfiguration — rose from #5; SSRF consolidated into A01
  • A03 - Software Supply Chain Failures — NEW, expanded from "Vulnerable Components" to cover build systems and distribution infrastructure
  • A05 - Injection — fell from #3 but remains easily exploitable
  • A10 - Mishandling of Exceptional Conditions — NEW, fail-open logic and data leaks through error handling

Why It Matters for AI-Assisted Development

AI-generated code produces the same classic vulnerabilities humans do — just more of them. The OWASP Top 10 serves as a baseline checklist for reviewing AI output:

  • A03 (Supply Chain) is especially relevant given AI's tendency to suggest compromised or nonexistent packages
  • A10 (Exceptional Conditions) catches fail-open patterns common in AI-generated error handling
  • Semgrep has updated 4,000+ rules mapped to the 2025 edition

Strengths

  • Gold standard for web application security since 2003
  • Data-driven scoring model (exploitability + impact, not just frequency)
  • Universal adoption; drives entire tooling ecosystems

Limitations

  • Web-application focused; does not cover AI-specific threats
  • Updated only every ~4 years
  • Does not address prompt injection, model poisoning, or other LLM threats (see OWASP LLM Top 10)