OWASP Top 10 Vulnerabilities

Understanding Risks in Your Applications

Web Vulnerabilities

A01:2021-Broken Access Control

Broken Access Control occurs when users can act outside of their intended permissions, allowing unauthorized access to sensitive data or functionality.

A02:2021-Cryptographic Failures

Cryptographic Failures refer to weaknesses in cryptographic implementations leading to sensitive data exposure or system compromise.

A03:2021-Injection

Injection attacks occur when untrusted data is sent to an interpreter as part of a command or query, allowing attackers to execute arbitrary commands.

A04:2021-Insecure Design

Insecure Design focuses on risks related to design flaws, highlighting the need for secure design patterns and threat modeling.

A05:2021-Security Misconfiguration

Security Misconfiguration occurs when security settings are not defined, implemented, or maintained, leading to exposure of sensitive data.

A06:2021-Vulnerable and Outdated Components

Using components with known vulnerabilities can lead to exploitation; keeping software up to date is essential for security.

A07:2021-Identification and Authentication Failures

Failures in identification and authentication can allow unauthorized users to gain access, compromising security.

A08:2021-Software and Data Integrity Failures

Software and Data Integrity Failures occur when assumptions about software updates or data integrity are made without verification, leading to potential exploitation.

A09:2021-Security Logging and Monitoring Failures

Insufficient logging and monitoring can impede incident detection and response, leaving systems vulnerable to attacks.

A10:2021-Server-Side Request Forgery

Server-Side Request Forgery (SSRF) allows attackers to send unauthorized requests from the server, potentially accessing internal resources.

API Vulnerabilities

API1:2023 Broken Object Level Authorization

APIs tend to expose endpoints that handle object identifiers, creating a wide attack surface of Object Level Access Control issues.

API2:2023 Broken Authentication

Authentication mechanisms are often implemented incorrectly, allowing attackers to compromise authentication tokens or exploit implementation flaws to assume other users' identities.

API3:2023 Broken Object Property Level Authorization

This category focuses on the lack of or improper authorization validation at the object property level, leading to information exposure or manipulation by unauthorized parties.

API4:2023 Unrestricted Resource Consumption

Successful attacks can lead to Denial of Service or increased operational costs due to unrestricted consumption of resources required to satisfy API requests.

API5:2023 Broken Function Level Authorization

Complex access control policies can lead to authorization flaws, allowing attackers to access other users’ resources or administrative functions.

API6:2023 Unrestricted Access to Sensitive Business Flows

APIs vulnerable to this risk expose business flows without compensating for excessive automated use, potentially harming the business.

API7:2023 Server Side Request Forgery

SSRF flaws occur when an API fetches a remote resource without validating the user-supplied URI, allowing attackers to send crafted requests to unexpected destinations.

API8:2023 Security Misconfiguration

Complex configurations can lead to security oversights, opening the door for various types of attacks if not properly managed.

API9:2023 Improper Inventory Management

A proper inventory of hosts and deployed API versions is crucial to mitigate issues like deprecated API versions and exposed debug endpoints.

API10:2023 Unsafe Consumption of APIs

Developers often trust data from third-party APIs more than user input, leading to weaker security standards and making APIs vulnerable to attacks.

LLM Vulnerabilities

LLM01:2025 Prompt Injection

A Prompt Injection Vulnerability occurs when user prompts alter the intended behavior of the model, potentially leading to unintended actions or outputs.

LLM02:2025 Sensitive Information Disclosure

Sensitive information can affect both the LLM and its application, leading to unauthorized access to private data or operational secrets.

LLM03:2025 Supply Chain

LLM supply chains are susceptible to various vulnerabilities, which can compromise the integrity and security of the models and their outputs.

LLM04:2025 Data and Model Poisoning

Data poisoning occurs when pre-training, fine-tuning, or embedding data is intentionally corrupted to manipulate model behavior.

LLM05:2025 Improper Output Handling

Improper Output Handling refers specifically to insufficient validation, sanitization, and handling of outputs generated by the model.

LLM06:2025 Excessive Agency

An LLM-based system is often granted a degree of agency that can lead to unintended consequences if not properly controlled.

LLM07:2025 System Prompt Leakage

The system prompt leakage vulnerability in LLMs refers to the unintentional exposure of internal prompts that can be exploited by attackers.

LLM08:2025 Vector and Embedding Weaknesses

Vectors and embeddings vulnerabilities present significant security risks in systems relying on LLMs for data representation and processing.

LLM09:2025 Misinformation

Misinformation from LLMs poses a core vulnerability for applications relying on the accuracy of generated information.

LLM10:2025 Unbounded Consumption

Unbounded Consumption refers to the process where a Large Language Model consumes resources without proper limits, potentially leading to denial of service.