November 17, 2025

OWASP Top 10 2025 RC1: What’s New and How to Prepare

OWASP Top 10 2025 RC1: What’s New and How to Prepare
By Fabio Cerullo - Managing Director - Cycubix

The OWASP Top 10 2025 Release Candidate 1 (RC1) marks the eighth edition of the world’s most referenced application security standard. More than just an update, it reflects of how software security must advance alongside technology.

What Is the OWASP Top 10?

The OWASP Top 10 is a globally recognised awareness standard for web application security, maintained by the Open Worldwide Application Security Project (OWASP). It identifies the ten most critical security risks that threaten modern applications, from access control weaknesses to software supply chain failures.

More than a checklist, the OWASP Top 10 acts as a practical guide for secure development. It helps developers and engineers understand where vulnerabilities emerge and how to design systems that prevent them from the outset.

Each edition is grounded in real-world data and community expertise, drawing from vulnerability databases, penetration testing reports, and global surveys to reflect current attack patterns.

For teams adopting DevSecOps or aligning with frameworks like ISO 27001, PCI DSS, or NIST SSDF, the OWASP Top 10 provides a clear foundation for embedding security by design into every stage of the software lifecycle.

In essence, it’s a shared language for building resilient, trustworthy applications, one that keeps pace with how technology and threats continue to change.

Why the OWASP Top 10 2025 Matters

This 2025 version introduces new categories, redefines existing ones, and places stronger emphasis on secure design, supply chain integrity, and real-world misconfigurations.

If your team still operates around the OWASP Top 10 2021 framework, now is the time to bring your practices up to date, ensuring your applications remain secure in today’s environment of cloud-native architectures, API-driven systems, automated CI/CD pipelines, and AI-assisted development.

  • Broader Data Foundation: Based on 589 CWEs (up from 400 in 2021), providing a more comprehensive view of real-world risks.
  • Two New Categories, One Consolidation: Reflecting modern risks like Software Supply Chain Failures and Mishandling of Exceptional Conditions.
  • Root Cause Focus: Categories now emphasize causes — not just symptoms — of vulnerabilities.
  • Reordered Risk Landscape: Security Misconfiguration moves to #2, Injection drops to #5, reflecting shifts in real-world prevalence.
  • Community-Driven Insight: Combines quantitative data with community surveys to bridge the gap between analytics and attacker behavior.

The OWASP Top 10 2025 RC1 Categories

Figure 1. The OWASP Top 10: 2025 Release Candidate 1 (RC1) categories. This list represents the ten most critical application security risks identified globally, with Broken Access Control remaining the top concern.

(Source: OWASP Top 10 2025 Introduction)

Key Takeaways from the 2025 Update

1) Security Misconfiguration Is the New Hot Zone

Default credentials, open S3 buckets, exposed Kubernetes dashboards — misconfiguration is no longer an operational mistake; it’s an existential risk.

Action: Adopt configuration-as-code reviews, automate drift detection, and apply least privilege everywhere.

2) Software Supply Chain Risk Goes Mainstream

“Vulnerable Components” wasn't enough. The 2025 version recognises that how software is built and distributed can be just as dangerous as what is in the code.

Action: Implement dependency signing, SBOM tracking, and pipeline integrity checks.

3) Secure Design Is Now Non-Negotiable

Security can’t be bolted on at the end. OWASP Top 10 2025 expands on Insecure Design to address Threat Modeling, architecture, and systemic weaknesses.

Action: Embed security design reviews in every project phase, not after deployment.

4) Mishandled Exceptions Are Silent Killers

This new category targets unsafe error handling that exposes stack traces or leaves systems in inconsistent states.
Action: Validate all error-handling logic and ensure applications fail safe, not open.

5) Logging and Visibility Remain Weak

The renamed Logging and Alerting Failures reflects how poor observability continues to hinder detection and response.

Action: Unify logging across environments and automate alert triage.

How to Prepare Your Organisation — Step-by-Step

1. Perform a Gap Analysis: Map your current SDLC controls to the 2025 categories. Identify weak coverage in supply chain, design, and exception handling.

2. Update Your Secure Development Framework

  • Integrate Threat Modeling in the design-phase for all major projects.
  • Embed SBOM and SCA (Software Composition Analysis) scanning in CI/CD.
  • Review configuration-as-code templates regularly.

3. Train and Empower Your Developers: Equip teams with hands-on secure coding training aligned with OWASP Top 10 2025. Move beyond awareness to practical skill.

4. Modernise Your Metrics: Measure maturity by tracking for example:

  • % of dependencies with verified integrity
  • Mean time to remediate misconfigurations

Final Thoughts

The OWASP Top 10 2025 RC1 isn’t just an iteration, it’s a recalibration of what secure software means in a world of cloud-native systems, interconnected APIs, and automated pipelines. The industry’s focus has shifted from code vulnerabilities to systemic integrity.

It’s about designing for resilience, building with integrity, and enabling teams to anticipate risks before they become incidents.

Ready to prepare your teams for today’s threats and opportunities?

At Cycubix, we help development and engineering teams achieve this mindset, translating frameworks like the OWASP Top 10 into practical, day-to-day security practices that strengthen code, systems, and people.

Explore our hands-on Application Security and Secure Coding Training or contact us to build security-first development teams that grow fearless.