CWE VIEW: Weaknesses in OWASP Top Ten RC1 (2025)
CWE entries in this view (graph) are associated with the first release candidate (RC1) of the OWASP Top Ten, as released in 2025.
The following graph shows the tree-like relationships between
weaknesses that exist at different levels of abstraction. At the highest level, categories
and pillars exist to group weaknesses. Categories (which are not technically weaknesses) are
special CWE entries used to group weaknesses that share a common characteristic. Pillars are
weaknesses that are described in the most abstract fashion. Below these top-level entries
are weaknesses are varying levels of abstraction. Classes are still very abstract, typically
independent of any specific language or technology. Base level weaknesses are used to
present a more specific type of weakness. A variant is a weakness that is described at a
very low level of detail, typically limited to a specific language or technology. A chain is
a set of weaknesses that must be reachable consecutively in order to produce an exploitable
vulnerability. While a composite is a set of weaknesses that must all be present
simultaneously in order to produce an exploitable vulnerability.
Show Details:
1450 - Weaknesses in OWASP Top Ten RC1 (2025)
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control)
Weaknesses in this category are related to the A01 category "Broken Access Control" in the OWASP Top Ten 2025.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
1275
(Sensitive Cookie with Improper SameSite Attribute)
The SameSite attribute for sensitive cookies is not set, or an insecure value is used.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
200
(Exposure of Sensitive Information to an Unauthorized Actor)
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Information Disclosure
Information Leak
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
201
(Insertion of Sensitive Information Into Sent Data)
The code transmits data to another actor, but a portion of the data includes sensitive information that should not be accessible to that actor.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
219
(Storage of File with Sensitive Data Under Web Root)
The product stores sensitive data under the web document root with insufficient access control, which might make it accessible to untrusted parties.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
22
(Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Directory traversal
Path traversal
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
23
(Relative Path Traversal)
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.
Zip Slip
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
276
(Incorrect Default Permissions)
During installation, installed file permissions are set to allow anyone to modify those files.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
281
(Improper Preservation of Permissions)
The product does not preserve permissions or incorrectly preserves permissions when copying, restoring, or sharing objects, which can cause them to have less restrictive permissions than intended.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
282
(Improper Ownership Management)
The product assigns the wrong ownership, or does not properly verify the ownership, of an object or resource.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
283
(Unverified Ownership)
The product does not properly verify that a critical resource is owned by the proper entity.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
284
(Improper Access Control)
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Authorization
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
285
(Improper Authorization)
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
AuthZ
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
352
(Cross-Site Request Forgery (CSRF))
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Session Riding
Cross Site Reference Forgery
XSRF
CSRF
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
359
(Exposure of Private Personal Information to an Unauthorized Actor)
The product does not properly prevent a person's private, personal information from being accessed by actors who either (1) are not explicitly authorized to access the information or (2) do not have the implicit consent of the person about whom the information is collected.
Privacy violation
Privacy leak / Privacy leakage
PPI
PII
PHI
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
36
(Absolute Path Traversal)
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize absolute path sequences such as "/abs/path" that can resolve to a location that is outside of that directory.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
377
(Insecure Temporary File)
Creating and using insecure temporary files can leave application and system data vulnerable to attack.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
379
(Creation of Temporary File in Directory with Insecure Permissions)
The product creates a temporary file in a directory whose permissions allow unintended actors to determine the file's existence or otherwise access that file.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
402
(Transmission of Private Resources into a New Sphere ('Resource Leak'))
The product makes resources available to untrusted parties when those resources are only intended to be accessed by the product.
Resource Leak
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
424
(Improper Protection of Alternate Path)
The product does not sufficiently protect all possible paths that a user can take to access restricted functionality or resources.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
425
(Direct Request ('Forced Browsing'))
The web application does not adequately enforce appropriate authorization on all restricted URLs, scripts, or files.
forced browsing
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
441
(Unintended Proxy or Intermediary ('Confused Deputy'))
The product receives a request, message, or directive from an upstream component, but the product does not sufficiently preserve the original source of the request before forwarding the request to an external actor that is outside of the product's control sphere. This causes the product to appear to be the source of the request, leading it to act as a proxy or other intermediary between the upstream component and the external actor.
Confused Deputy
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
497
(Exposure of Sensitive System Information to an Unauthorized Control Sphere)
The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
538
(Insertion of Sensitive Information into Externally-Accessible File or Directory)
The product places sensitive information into files or directories that are accessible to actors who are allowed to have access to the files, but not to the sensitive information.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
540
(Inclusion of Sensitive Information in Source Code)
Source code on a web server or repository often contains sensitive information and should generally not be accessible to users.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
548
(Exposure of Information Through Directory Listing)
The product inappropriately exposes a directory listing with an index of all the resources located inside of the directory.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
552
(Files or Directories Accessible to External Parties)
The product makes files or directories accessible to unauthorized actors, even though they should not be.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
566
(Authorization Bypass Through User-Controlled SQL Primary Key)
The product uses a database table that includes records that should not be accessible to an actor, but it executes a SQL statement with a primary key that can be controlled by that actor.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
59
(Improper Link Resolution Before File Access ('Link Following'))
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
insecure temporary file
Zip Slip
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
601
(URL Redirection to Untrusted Site ('Open Redirect'))
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Open Redirect
Cross-site Redirect
Cross-domain Redirect
Unvalidated Redirect
Drive-by download
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
61
(UNIX Symbolic Link (Symlink) Following)
The product, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files.
Symlink following
symlink vulnerability
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
615
(Inclusion of Sensitive Information in Source Code Comments)
While adding general comments is very useful, some programmers tend to leave important data, such as: filenames related to the web application, old links or links which were not meant to be browsed by users, old code fragments, etc.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
639
(Authorization Bypass Through User-Controlled Key)
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Insecure Direct Object Reference / IDOR
Broken Object Level Authorization / BOLA
Horizontal Authorization
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
65
(Windows Hard Link)
The product, when opening a file or directory, does not sufficiently handle when the name is associated with a hard link to a target that is outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
668
(Exposure of Resource to Wrong Sphere)
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
732
(Incorrect Permission Assignment for Critical Resource)
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
749
(Exposed Dangerous Method or Function)
The product provides an Applications Programming Interface (API) or similar interface for interaction with external actors, but the interface includes a dangerous method or function that is not properly restricted.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
862
(Missing Authorization)
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
AuthZ
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
863
(Incorrect Authorization)
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
AuthZ
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
918
(Server-Side Request Forgery (SSRF))
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
XSPA
SSRF
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1436
(OWASP Top Ten 2025 Category A01:2025 - Broken Access Control) >
922
(Insecure Storage of Sensitive Information)
The product stores sensitive information without properly limiting read or write access by unauthorized actors.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1437
(OWASP Top Ten 2025 Category A02:2025 - Security Misconfiguration)
Weaknesses in this category are related to the A02 category "Security Misconfiguration" in the OWASP Top Ten 2025.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1437
(OWASP Top Ten 2025 Category A02:2025 - Security Misconfiguration) >
1004
(Sensitive Cookie Without 'HttpOnly' Flag)
The product uses a cookie to store sensitive information, but the cookie is not marked with the HttpOnly flag.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1437
(OWASP Top Ten 2025 Category A02:2025 - Security Misconfiguration) >
11
(ASP.NET Misconfiguration: Creating Debug Binary)
Debugging messages help attackers learn about the system and plan a form of attack.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1437
(OWASP Top Ten 2025 Category A02:2025 - Security Misconfiguration) >
1174
(ASP.NET Misconfiguration: Improper Model Validation)
The ASP.NET application does not use, or incorrectly uses, the model validation framework.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1437
(OWASP Top Ten 2025 Category A02:2025 - Security Misconfiguration) >
13
(ASP.NET Misconfiguration: Password in Configuration File)
Storing a plaintext password in a configuration file allows anyone who can read the file access to the password-protected resource making them an easy target for attackers.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1437
(OWASP Top Ten 2025 Category A02:2025 - Security Misconfiguration) >
15
(External Control of System or Configuration Setting)
One or more system settings or configuration elements can be externally controlled by a user.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1437
(OWASP Top Ten 2025 Category A02:2025 - Security Misconfiguration) >
16
(Configuration)
Weaknesses in this category are typically introduced during the configuration of the software.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1437
(OWASP Top Ten 2025 Category A02:2025 - Security Misconfiguration) >
260
(Password in Configuration File)
The product stores a password in a configuration file that might be accessible to actors who do not know the password.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1437
(OWASP Top Ten 2025 Category A02:2025 - Security Misconfiguration) >
315
(Cleartext Storage of Sensitive Information in a Cookie)
The product stores sensitive information in cleartext in a cookie.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1437
(OWASP Top Ten 2025 Category A02:2025 - Security Misconfiguration) >
489
(Active Debug Code)
The product is released with debugging code still enabled or active.
Leftover debug code
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1437
(OWASP Top Ten 2025 Category A02:2025 - Security Misconfiguration) >
5
(J2EE Misconfiguration: Data Transmission Without Encryption)
Information sent over a network can be compromised while in transit. An attacker may be able to read or modify the contents if the data are sent in plaintext or are weakly encrypted.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1437
(OWASP Top Ten 2025 Category A02:2025 - Security Misconfiguration) >
526
(Cleartext Storage of Sensitive Information in an Environment Variable)
The product uses an environment variable to store unencrypted sensitive information.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1437
(OWASP Top Ten 2025 Category A02:2025 - Security Misconfiguration) >
547
(Use of Hard-coded, Security-relevant Constants)
The product uses hard-coded constants instead of symbolic names for security-critical values, which increases the likelihood of mistakes during code maintenance or security policy change.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1437
(OWASP Top Ten 2025 Category A02:2025 - Security Misconfiguration) >
611
(Improper Restriction of XML External Entity Reference)
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
XXE
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1437
(OWASP Top Ten 2025 Category A02:2025 - Security Misconfiguration) >
614
(Sensitive Cookie in HTTPS Session Without 'Secure' Attribute)
The Secure attribute for sensitive cookies in HTTPS sessions is not set.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1437
(OWASP Top Ten 2025 Category A02:2025 - Security Misconfiguration) >
776
(Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion'))
The product uses XML documents and allows their structure to be defined with a Document Type Definition (DTD), but it does not properly control the number of recursive definitions of entities.
XEE
Billion Laughs Attack
XML Bomb
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1437
(OWASP Top Ten 2025 Category A02:2025 - Security Misconfiguration) >
942
(Permissive Cross-domain Security Policy with Untrusted Domains)
The product uses a web-client protection
mechanism such as a Content Security Policy (CSP) or
cross-domain policy file, but the policy includes untrusted
domains with which the web client is allowed to
communicate.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1438
(OWASP Top Ten 2025 Category A03:2025 - Software Supply Chain Failures)
Weaknesses in this category are related to the A03 category "Software Supply Chain Failures" in the OWASP Top Ten 2025.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1438
(OWASP Top Ten 2025 Category A03:2025 - Software Supply Chain Failures) >
1035
(OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities)
Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1438
(OWASP Top Ten 2025 Category A03:2025 - Software Supply Chain Failures) >
1104
(Use of Unmaintained Third Party Components)
The product relies on third-party components that are not
actively supported or maintained by the original developer or a trusted proxy
for the original developer.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1438
(OWASP Top Ten 2025 Category A03:2025 - Software Supply Chain Failures) >
1329
(Reliance on Component That is Not Updateable)
The product contains a component that cannot be updated or patched in order to remove vulnerabilities or significant bugs.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1438
(OWASP Top Ten 2025 Category A03:2025 - Software Supply Chain Failures) >
1395
(Dependency on Vulnerable Third-Party Component)
The product has a dependency on a third-party component that contains one or more known vulnerabilities.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1438
(OWASP Top Ten 2025 Category A03:2025 - Software Supply Chain Failures) >
447
(Unimplemented or Unsupported Feature in UI)
A UI function for a security feature appears to be supported and gives feedback to the user that suggests that it is supported, but the underlying functionality is not implemented.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1438
(OWASP Top Ten 2025 Category A03:2025 - Software Supply Chain Failures) >
477
(Use of Obsolete Function)
The code uses deprecated or obsolete functions, which suggests that the code has not been actively reviewed or maintained.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures)
Weaknesses in this category are related to the A04 category "Cryptographic Failures" in the OWASP Top Ten 2025.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
1240
(Use of a Cryptographic Primitive with a Risky Implementation)
To fulfill the need for a cryptographic primitive, the product implements a cryptographic algorithm using a non-standard, unproven, or disallowed/non-compliant cryptographic implementation.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
1241
(Use of Predictable Algorithm in Random Number Generator)
The device uses an algorithm that is predictable and generates a pseudo-random number.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
261
(Weak Encoding for Password)
Obscuring a password with a trivial encoding does not protect the password.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
296
(Improper Following of a Certificate's Chain of Trust)
The product does not follow, or incorrectly follows, the chain of trust for a certificate back to a trusted root certificate, resulting in incorrect trust of any resource that is associated with that certificate.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
319
(Cleartext Transmission of Sensitive Information)
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
320
(Key Management Errors)
Weaknesses in this category are related to errors in the management of cryptographic keys.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
321
(Use of Hard-coded Cryptographic Key)
The product uses a hard-coded, unchangeable cryptographic key.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
322
(Key Exchange without Entity Authentication)
The product performs a key exchange with an actor without verifying the identity of that actor.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
323
(Reusing a Nonce, Key Pair in Encryption)
Nonces should be used for the present occasion and only once.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
324
(Use of a Key Past its Expiration Date)
The product uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against that key.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
325
(Missing Cryptographic Step)
The product does not implement a required step in a cryptographic algorithm, resulting in weaker encryption than advertised by the algorithm.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
326
(Inadequate Encryption Strength)
The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
327
(Use of a Broken or Risky Cryptographic Algorithm)
The product uses a broken or risky cryptographic algorithm or protocol.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
328
(Use of Weak Hash)
The product uses an algorithm that produces a digest (output value) that does not meet security expectations for a hash function that allows an adversary to reasonably determine the original input (preimage attack), find another input that can produce the same hash (2nd preimage attack), or find multiple inputs that evaluate to the same hash (birthday attack).
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
329
(Generation of Predictable IV with CBC Mode)
The product generates and uses a predictable initialization Vector (IV) with Cipher Block Chaining (CBC) Mode, which causes algorithms to be susceptible to dictionary attacks when they are encrypted under the same key.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
330
(Use of Insufficiently Random Values)
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
331
(Insufficient Entropy)
The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
332
(Insufficient Entropy in PRNG)
The lack of entropy available for, or used by, a Pseudo-Random Number Generator (PRNG) can be a stability and security threat.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
334
(Small Space of Random Values)
The number of possible random values is smaller than needed by the product, making it more susceptible to brute force attacks.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
335
(Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG))
The product uses a Pseudo-Random Number Generator (PRNG) but does not correctly manage seeds.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
336
(Same Seed in Pseudo-Random Number Generator (PRNG))
A Pseudo-Random Number Generator (PRNG) uses the same seed each time the product is initialized.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
337
(Predictable Seed in Pseudo-Random Number Generator (PRNG))
A Pseudo-Random Number Generator (PRNG) is initialized from a predictable seed, such as the process ID or system time.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
338
(Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG))
The product uses a Pseudo-Random Number Generator (PRNG) in a security context, but the PRNG's algorithm is not cryptographically strong.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
340
(Generation of Predictable Numbers or Identifiers)
The product uses a scheme that generates numbers or identifiers that are more predictable than required.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
342
(Predictable Exact Value from Previous Values)
An exact value or random number can be precisely predicted by observing previous values.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
347
(Improper Verification of Cryptographic Signature)
The product does not verify, or incorrectly verifies, the cryptographic signature for data.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
523
(Unprotected Transport of Credentials)
Login pages do not use adequate measures to protect the user name and password while they are in transit from the client to the server.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
757
(Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade'))
A protocol or its implementation supports interaction between multiple actors and allows those actors to negotiate which algorithm should be used as a protection mechanism such as encryption or authentication, but it does not select the strongest algorithm that is available to both parties.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
759
(Use of a One-Way Hash without a Salt)
The product uses a one-way cryptographic hash against an input that should not be reversible, such as a password, but the product does not also use a salt as part of the input.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
760
(Use of a One-Way Hash with a Predictable Salt)
The product uses a one-way cryptographic hash against an input that should not be reversible, such as a password, but the product uses a predictable salt as part of the input.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
780
(Use of RSA Algorithm without OAEP)
The product uses the RSA algorithm but does not incorporate Optimal Asymmetric Encryption Padding (OAEP), which might weaken the encryption.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1439
(OWASP Top Ten 2025 Category A04:2025 - Cryptographic Failures) >
916
(Use of Password Hash With Insufficient Computational Effort)
The product generates a hash for a password, but it uses a scheme that does not provide a sufficient level of computational effort that would make password cracking attacks infeasible or expensive.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection)
Weaknesses in this category are related to the A05 category "Injection" in the OWASP Top Ten 2025.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
103
(Struts: Incomplete validate() Method Definition)
The product has a validator form that either does not define a validate() method, or defines a validate() method but does not call super.validate().
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
104
(Struts: Form Bean Does Not Extend Validation Class)
If a form bean does not extend an ActionForm subclass of the Validator framework, it can expose the application to other weaknesses related to insufficient input validation.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
112
(Missing XML Validation)
The product accepts XML from an untrusted source but does not validate the XML against the proper schema.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
113
(Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting'))
The product receives data from an HTTP agent/component (e.g., web server, proxy, browser, etc.), but it does not neutralize or incorrectly neutralizes CR and LF characters before the data is included in outgoing HTTP headers.
HTTP Request Splitting
HTTP Response Splitting
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
114
(Process Control)
Executing commands or loading libraries from an untrusted source or in an untrusted environment can cause an application to execute malicious commands (and payloads) on behalf of an attacker.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
115
(Misinterpretation of Input)
The product misinterprets an input, whether from an attacker or another product, in a security-relevant fashion.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
116
(Improper Encoding or Escaping of Output)
The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.
Output Sanitization
Output Validation
Output Encoding
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
129
(Improper Validation of Array Index)
The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array.
out-of-bounds array index
index-out-of-range
array index underflow
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
159
(Improper Handling of Invalid Use of Special Elements)
The product does not properly filter, remove, quote, or otherwise manage the invalid use of special elements in user-controlled input, which could cause adverse effect on its behavior and integrity.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
20
(Improper Input Validation)
The product receives input or data, but it does
not validate or incorrectly validates that the input has the
properties that are required to process the data safely and
correctly.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
470
(Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection'))
The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.
Reflection Injection
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
493
(Critical Public Variable Without Final Modifier)
The product has a critical public variable that is not final, which allows the variable to be modified to contain unexpected values.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
500
(Public Static Field Not Marked Final)
An object contains a public static field that is not marked final, which might allow it to be modified in unexpected ways.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
564
(SQL Injection: Hibernate)
Using Hibernate to execute a dynamic SQL statement built with user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
610
(Externally Controlled Reference to a Resource in Another Sphere)
The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
643
(Improper Neutralization of Data within XPath Expressions ('XPath Injection'))
The product uses external input to dynamically construct an XPath expression used to retrieve data from an XML database, but it does not neutralize or incorrectly neutralizes that input. This allows an attacker to control the structure of the query.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
644
(Improper Neutralization of HTTP Headers for Scripting Syntax)
The product does not neutralize or incorrectly neutralizes web scripting syntax in HTTP headers that can be used by web browser components that can process raw headers, such as Flash.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
74
(Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection'))
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
76
(Improper Neutralization of Equivalent Special Elements)
The product correctly neutralizes certain special elements, but it improperly neutralizes equivalent special elements.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
77
(Improper Neutralization of Special Elements used in a Command ('Command Injection'))
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Command injection
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
78
(Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'))
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Shell injection
Shell metacharacters
OS Command Injection
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
79
(Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
XSS
HTML Injection
Reflected XSS / Non-Persistent XSS / Type 1 XSS
Stored XSS / Persistent XSS / Type 2 XSS
DOM-Based XSS / Type 0 XSS
CSS
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
80
(Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS))
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
83
(Improper Neutralization of Script in Attributes in a Web Page)
The product does not neutralize or incorrectly neutralizes "javascript:" or other URIs from dangerous attributes within tags, such as onmouseover, onload, onerror, or style.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
86
(Improper Neutralization of Invalid Characters in Identifiers in Web Pages)
The product does not neutralize or incorrectly neutralizes invalid characters or byte sequences in the middle of tag names, URI schemes, and other identifiers.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
88
(Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'))
The product constructs a string for a command to be executed by a separate component
in another control sphere, but it does not properly delimit the
intended arguments, options, or switches within that command string.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
89
(Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'))
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
SQL injection
SQLi
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
90
(Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection'))
The product constructs all or part of an LDAP query using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended LDAP query when it is sent to a downstream component.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
91
(XML Injection (aka Blind XPath Injection))
The product does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
917
(Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection'))
The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed.
EL Injection
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
93
(Improper Neutralization of CRLF Sequences ('CRLF Injection'))
The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
94
(Improper Control of Generation of Code ('Code Injection'))
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Code Injection
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
95
(Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection'))
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call (e.g. "eval").
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
96
(Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection'))
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before inserting the input into an executable resource, such as a library, configuration file, or template.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
97
(Improper Neutralization of Server-Side Includes (SSI) Within a Web Page)
The product generates a web page, but does not neutralize or incorrectly neutralizes user-controllable input that could be interpreted as a server-side include (SSI) directive.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
98
(Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion'))
The PHP application receives input from an upstream component, but it does not restrict or incorrectly restricts the input before its usage in "require," "include," or similar functions.
Remote file include
RFI
Local file inclusion
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1440
(OWASP Top Ten 2025 Category A05:2025 - Injection) >
99
(Improper Control of Resource Identifiers ('Resource Injection'))
The product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control.
Insecure Direct Object Reference
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design)
Weaknesses in this category are related to the A06 category "Insecure Design" in the OWASP Top Ten 2025.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
1021
(Improper Restriction of Rendered UI Layers or Frames)
The web application does not restrict or incorrectly restricts frame objects or UI layers that belong to another application or domain, which can lead to user confusion about which interface the user is interacting with.
Clickjacking
UI Redress Attack
Tapjacking
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
1022
(Use of Web Link to Untrusted Target with window.opener Access)
The web application produces links to untrusted external sites outside of its sphere of control, but it does not properly prevent the external site from modifying security-critical properties of the window.opener object, such as the location property.
tabnabbing
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
1125
(Excessive Attack Surface)
The product has an attack surface whose quantitative
measurement exceeds a desirable maximum.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
183
(Permissive List of Allowed Inputs)
The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are explicitly allowed by policy because the inputs are assumed to be safe, but the list is too permissive - that is, it allows an input that is unsafe, leading to resultant weaknesses.
Allowlist / Allow List
Safelist / Safe List
Whitelist / White List
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
256
(Plaintext Storage of a Password)
The product stores a password in plaintext within resources such as memory or files.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
266
(Incorrect Privilege Assignment)
A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
269
(Improper Privilege Management)
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
286
(Incorrect User Management)
The product does not properly manage a user within its environment.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
311
(Missing Encryption of Sensitive Data)
The product does not encrypt sensitive or critical information before storage or transmission.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
312
(Cleartext Storage of Sensitive Information)
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
313
(Cleartext Storage in a File or on Disk)
The product stores sensitive information in cleartext in a file, or on disk.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
316
(Cleartext Storage of Sensitive Information in Memory)
The product stores sensitive information in cleartext in memory.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
362
(Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition'))
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Race Condition
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
382
(J2EE Bad Practices: Use of System.exit())
A J2EE application uses System.exit(), which also shuts down its container.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
419
(Unprotected Primary Channel)
The product uses a primary channel for administration or restricted functionality, but it does not properly protect the channel.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
434
(Unrestricted Upload of File with Dangerous Type)
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Unrestricted File Upload
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
436
(Interpretation Conflict)
Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
444
(Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling'))
The product acts as an intermediary HTTP agent
(such as a proxy or firewall) in the data flow between two
entities such as a client and server, but it does not
interpret malformed HTTP requests or responses in ways that
are consistent with how the messages will be processed by
those entities that are at the ultimate destination.
HTTP Request Smuggling
HTTP Response Smuggling
HTTP Smuggling
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
451
(User Interface (UI) Misrepresentation of Critical Information)
The user interface (UI) does not properly represent critical information to the user, allowing the information - or its source - to be obscured or spoofed. This is often a component in phishing attacks.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
454
(External Initialization of Trusted Variables or Data Stores)
The product initializes critical internal variables or data stores using inputs that can be modified by untrusted actors.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
472
(External Control of Assumed-Immutable Web Parameter)
The web application does not sufficiently verify inputs that are assumed to be immutable but are actually externally controllable, such as hidden form fields.
Assumed-Immutable Parameter Tampering
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
501
(Trust Boundary Violation)
The product mixes trusted and untrusted data in the same data structure or structured message.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
522
(Insufficiently Protected Credentials)
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
525
(Use of Web Browser Cache Containing Sensitive Information)
The web application does not use an appropriate caching policy that specifies the extent to which each web page and associated form fields should be cached.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
539
(Use of Persistent Cookies Containing Sensitive Information)
The web application uses persistent cookies, but the cookies contain sensitive information.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
598
(Use of GET Request Method With Sensitive Query Strings)
The web application uses the HTTP GET method to process a request and includes sensitive information in the query string of that request.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
602
(Client-Side Enforcement of Server-Side Security)
The product is composed of a server that relies on the client to implement a mechanism that is intended to protect the server.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
628
(Function Call with Incorrectly Specified Arguments)
The product calls a function, procedure, or routine with arguments that are not correctly specified, leading to always-incorrect behavior and resultant weaknesses.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
642
(External Control of Critical State Data)
The product stores security-critical state information about its users, or the product itself, in a location that is accessible to unauthorized actors.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
646
(Reliance on File Name or Extension of Externally-Supplied File)
The product allows a file to be uploaded, but it relies on the file name or extension of the file to determine the appropriate behaviors. This could be used by attackers to cause the file to be misclassified and processed in a dangerous fashion.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
653
(Improper Isolation or Compartmentalization)
The product does not properly compartmentalize or isolate functionality, processes, or resources that require different privilege levels, rights, or permissions.
Separation of Privilege
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
656
(Reliance on Security Through Obscurity)
The product uses a protection mechanism whose strength depends heavily on its obscurity, such that knowledge of its algorithms or key data is sufficient to defeat the mechanism.
Never Assuming your secrets are safe
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
657
(Violation of Secure Design Principles)
The product violates well-established principles for secure design.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
676
(Use of Potentially Dangerous Function)
The product invokes a potentially dangerous function that could introduce a vulnerability if it is used incorrectly, but the function can also be used safely.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
693
(Protection Mechanism Failure)
The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
73
(External Control of File Name or Path)
The product allows user input to control or influence paths or file names that are used in filesystem operations.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
799
(Improper Control of Interaction Frequency)
The product does not properly limit the number or frequency of interactions that it has with an actor, such as the number of incoming requests.
Insufficient anti-automation
Brute force
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
807
(Reliance on Untrusted Inputs in a Security Decision)
The product uses a protection mechanism that relies on the existence or values of an input, but the input can be modified by an untrusted actor in a way that bypasses the protection mechanism.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1441
(OWASP Top Ten 2025 Category A06:2025 - Insecure Design) >
841
(Improper Enforcement of Behavioral Workflow)
The product supports a session in which more than one behavior must be performed by an actor, but it does not properly ensure that the actor performs the behaviors in the required sequence.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures)
Weaknesses in this category are related to the A07 category "Authentication Failures" in the OWASP Top Ten 2025.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
1390
(Weak Authentication)
The product uses an authentication mechanism to restrict access to specific users or identities, but the mechanism does not sufficiently prove that the claimed identity is correct.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
1391
(Use of Weak Credentials)
The product uses weak credentials (such as a default key or hard-coded password) that can be calculated, derived, reused, or guessed by an attacker.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
1392
(Use of Default Credentials)
The product uses default credentials (such as passwords or cryptographic keys) for potentially critical functionality.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
1393
(Use of Default Password)
The product uses default passwords for potentially critical functionality.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
258
(Empty Password in Configuration File)
Using an empty string as a password is insecure.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
259
(Use of Hard-coded Password)
The product contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
287
(Improper Authentication)
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
authentification
AuthN
AuthC
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
288
(Authentication Bypass Using an Alternate Path or Channel)
The product requires authentication, but the product has an alternate path or channel that does not require authentication.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
289
(Authentication Bypass by Alternate Name)
The product performs authentication based on the name of a resource being accessed, or the name of the actor performing the access, but it does not properly check all possible names for that resource or actor.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
290
(Authentication Bypass by Spoofing)
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
291
(Reliance on IP Address for Authentication)
The product uses an IP address for authentication.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
293
(Using Referer Field for Authentication)
The referer field in HTTP requests can be easily modified and, as such, is not a valid means of message integrity checking.
referrer
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
294
(Authentication Bypass by Capture-replay)
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
295
(Improper Certificate Validation)
The product does not validate, or incorrectly validates, a certificate.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
297
(Improper Validation of Certificate with Host Mismatch)
The product communicates with a host that provides a certificate, but the product does not properly ensure that the certificate is actually associated with that host.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
298
(Improper Validation of Certificate Expiration)
A certificate expiration is not validated or is incorrectly validated, so trust may be assigned to certificates that have been abandoned due to age.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
299
(Improper Check for Certificate Revocation)
The product does not check or incorrectly checks the revocation status of a certificate, which may cause it to use a certificate that has been compromised.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
300
(Channel Accessible by Non-Endpoint)
The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint.
Adversary-in-the-Middle / AITM
Attacker-in-the-Middle / AITM
Man-in-the-Middle / MITM
Person-in-the-Middle / PITM
Monkey-in-the-Middle
Monster-in-the-Middle
Manipulator-in-the-Middle
On-path attack
Interception attack
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
302
(Authentication Bypass by Assumed-Immutable Data)
The authentication scheme or implementation uses key data elements that are assumed to be immutable, but can be controlled or modified by the attacker.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
303
(Incorrect Implementation of Authentication Algorithm)
The requirements for the product dictate the use of an established authentication algorithm, but the implementation of the algorithm is incorrect.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
304
(Missing Critical Step in Authentication)
The product implements an authentication technique, but it skips a step that weakens the technique.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
305
(Authentication Bypass by Primary Weakness)
The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
306
(Missing Authentication for Critical Function)
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
307
(Improper Restriction of Excessive Authentication Attempts)
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
308
(Use of Single-factor Authentication)
The product uses an authentication algorithm that uses a single factor (e.g., a password) in a security context that should require more than one factor.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
309
(Use of Password System for Primary Authentication)
The use of password systems as the primary means of authentication may be subject to several flaws or shortcomings, each reducing the effectiveness of the mechanism.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
346
(Origin Validation Error)
The product does not properly verify that the source of data or communication is valid.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
350
(Reliance on Reverse DNS Resolution for a Security-Critical Action)
The product performs reverse DNS resolution on an IP address to obtain the hostname and make a security decision, but it does not properly ensure that the IP address is truly associated with the hostname.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
384
(Session Fixation)
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
521
(Weak Password Requirements)
The product does not require that users should have strong passwords.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
613
(Insufficient Session Expiration)
According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
620
(Unverified Password Change)
When setting a new password for a user, the product does not require knowledge of the original password, or using another form of authentication.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
640
(Weak Password Recovery Mechanism for Forgotten Password)
The product contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
798
(Use of Hard-coded Credentials)
The product contains hard-coded credentials, such as a password or cryptographic key.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
940
(Improper Verification of Source of a Communication Channel)
The product establishes a communication channel to handle an incoming request that has been initiated by an actor, but it does not properly verify that the request is coming from the expected origin.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1442
(OWASP Top Ten 2025 Category A07:2025 - Authentication Failures) >
941
(Incorrectly Specified Destination in a Communication Channel)
The product creates a communication channel to initiate an outgoing request to an actor, but it does not correctly specify the intended destination for that actor.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1443
(OWASP Top Ten 2025 Category A08:2025 - Software or Data Integrity Failures)
Weaknesses in this category are related to the A08 category "Software or Data Integrity Failures" in the OWASP Top Ten 2025.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1443
(OWASP Top Ten 2025 Category A08:2025 - Software or Data Integrity Failures) >
345
(Insufficient Verification of Data Authenticity)
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1443
(OWASP Top Ten 2025 Category A08:2025 - Software or Data Integrity Failures) >
353
(Missing Support for Integrity Check)
The product uses a transmission protocol that does not include a mechanism for verifying the integrity of the data during transmission, such as a checksum.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1443
(OWASP Top Ten 2025 Category A08:2025 - Software or Data Integrity Failures) >
426
(Untrusted Search Path)
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.
Untrusted Path
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1443
(OWASP Top Ten 2025 Category A08:2025 - Software or Data Integrity Failures) >
427
(Uncontrolled Search Path Element)
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
DLL preloading
Binary planting
Insecure library loading
Dependency confusion
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1443
(OWASP Top Ten 2025 Category A08:2025 - Software or Data Integrity Failures) >
494
(Download of Code Without Integrity Check)
The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1443
(OWASP Top Ten 2025 Category A08:2025 - Software or Data Integrity Failures) >
502
(Deserialization of Untrusted Data)
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Marshaling, Unmarshaling
Pickling, Unpickling
PHP Object Injection
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1443
(OWASP Top Ten 2025 Category A08:2025 - Software or Data Integrity Failures) >
506
(Embedded Malicious Code)
The product contains code that appears to be malicious in nature.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1443
(OWASP Top Ten 2025 Category A08:2025 - Software or Data Integrity Failures) >
509
(Replicating Malicious Code (Virus or Worm))
Replicating malicious code, including viruses and worms, will attempt to attack other systems once it has successfully compromised the target system or the product.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1443
(OWASP Top Ten 2025 Category A08:2025 - Software or Data Integrity Failures) >
565
(Reliance on Cookies without Validation and Integrity Checking)
The product relies on the existence or values of cookies when performing security-critical operations, but it does not properly ensure that the setting is valid for the associated user.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1443
(OWASP Top Ten 2025 Category A08:2025 - Software or Data Integrity Failures) >
784
(Reliance on Cookies without Validation and Integrity Checking in a Security Decision)
The product uses a protection mechanism that relies on the existence or values of a cookie, but it does not properly ensure that the cookie is valid for the associated user.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1443
(OWASP Top Ten 2025 Category A08:2025 - Software or Data Integrity Failures) >
829
(Inclusion of Functionality from Untrusted Control Sphere)
The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1443
(OWASP Top Ten 2025 Category A08:2025 - Software or Data Integrity Failures) >
830
(Inclusion of Web Functionality from an Untrusted Source)
The product includes web functionality (such as a web widget) from another domain, which causes it to operate within the domain of the product, potentially granting total access and control of the product to the untrusted source.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1443
(OWASP Top Ten 2025 Category A08:2025 - Software or Data Integrity Failures) >
915
(Improperly Controlled Modification of Dynamically-Determined Object Attributes)
The product receives input from an upstream component that specifies multiple attributes, properties, or fields that are to be initialized or updated in an object, but it does not properly control which attributes can be modified.
Mass Assignment
AutoBinding
PHP Object Injection
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1443
(OWASP Top Ten 2025 Category A08:2025 - Software or Data Integrity Failures) >
926
(Improper Export of Android Application Components)
The Android application exports a component for use by other applications, but does not properly restrict which applications can launch the component or access the data it contains.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1444
(OWASP Top Ten 2025 Category A09:2025 - Logging & Alerting Failures)
Weaknesses in this category are related to the A09 category "Logging & Alerting Failures" in the OWASP Top Ten 2025.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1444
(OWASP Top Ten 2025 Category A09:2025 - Logging & Alerting Failures) >
117
(Improper Output Neutralization for Logs)
The product constructs a log message from external input, but it does not neutralize or incorrectly neutralizes special elements when the message is written to a log file.
Log forging
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1444
(OWASP Top Ten 2025 Category A09:2025 - Logging & Alerting Failures) >
221
(Information Loss or Omission)
The product does not record, or improperly records, security-relevant information that leads to an incorrect decision or hampers later analysis.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1444
(OWASP Top Ten 2025 Category A09:2025 - Logging & Alerting Failures) >
223
(Omission of Security-relevant Information)
The product does not record or display information that would be important for identifying the source or nature of an attack, or determining if an action is safe.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1444
(OWASP Top Ten 2025 Category A09:2025 - Logging & Alerting Failures) >
532
(Insertion of Sensitive Information into Log File)
The product writes sensitive information to a log file.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1444
(OWASP Top Ten 2025 Category A09:2025 - Logging & Alerting Failures) >
778
(Insufficient Logging)
When a security-critical event occurs, the product either does not record the event or omits important details about the event when logging it.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions)
Weaknesses in this category are related to the A10 category "Mishandling of Exceptional Conditions" in the OWASP Top Ten 2025.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
209
(Generation of Error Message Containing Sensitive Information)
The product generates an error message that includes sensitive information about its environment, users, or associated data.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
215
(Insertion of Sensitive Information Into Debugging Code)
The product inserts sensitive information into debugging code, which could expose this information if the debugging code is not disabled in production.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
234
(Failure to Handle Missing Parameter)
If too few arguments are sent to a function, the function will still pop the expected number of arguments from the stack. Potentially, a variable number of arguments could be exhausted in a function as well.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
235
(Improper Handling of Extra Parameters)
The product does not handle or incorrectly handles when the number of parameters, fields, or arguments with the same name exceeds the expected amount.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
248
(Uncaught Exception)
An exception is thrown from a function, but it is not caught.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
252
(Unchecked Return Value)
The product does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
274
(Improper Handling of Insufficient Privileges)
The product does not handle or incorrectly handles when it has insufficient privileges to perform an operation, leading to resultant weaknesses.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
280
(Improper Handling of Insufficient Permissions or Privileges )
The product does not handle or incorrectly handles when it has insufficient privileges to access resources or functionality as specified by their permissions. This may cause it to follow unexpected code paths that may leave the product in an invalid state.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
369
(Divide By Zero)
The product divides a value by zero.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
390
(Detection of Error Condition Without Action)
The product detects a specific error, but takes no actions to handle the error.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
391
(Unchecked Error Condition)
[PLANNED FOR DEPRECATION. SEE MAINTENANCE NOTES AND CONSIDER CWE-252, CWE-248, OR CWE-1069.] Ignoring exceptions and other error conditions may allow an attacker to induce unexpected behavior unnoticed.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
394
(Unexpected Status Code or Return Value)
The product does not properly check when a function or operation returns a value that is legitimate for the function, but is not expected by the product.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
396
(Declaration of Catch for Generic Exception)
Catching overly broad exceptions promotes complex error handling code that is more likely to contain security vulnerabilities.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
397
(Declaration of Throws for Generic Exception)
The product throws or raises an overly broad exceptions that can hide important details and produce inappropriate responses to certain conditions.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
460
(Improper Cleanup on Thrown Exception)
The product does not clean up its state or incorrectly cleans up its state when an exception is thrown, leading to unexpected state or control flow.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
476
(NULL Pointer Dereference)
The product dereferences a pointer that it expects to be valid but is NULL.
NPD
null deref
NPE
nil pointer dereference
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
478
(Missing Default Case in Multiple Condition Expression)
The code does not have a default case in an expression with multiple conditions, such as a switch statement.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
484
(Omitted Break Statement in Switch)
The product omits a break statement within a switch or similar construct, causing code associated with multiple conditions to execute. This can cause problems when the programmer only intended to execute code associated with one condition.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
550
(Server-generated Error Message Containing Sensitive Information)
Certain conditions, such as network failure, will cause a server error message to be displayed.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
636
(Not Failing Securely ('Failing Open'))
When the product encounters an error condition or failure, its design requires it to fall back to a state that is less secure than other options that are available, such as selecting the weakest encryption algorithm or using the most permissive access control restrictions.
Failing Open
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
703
(Improper Check or Handling of Exceptional Conditions)
The product does not properly anticipate or handle exceptional conditions that rarely occur during normal operation of the product.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
754
(Improper Check for Unusual or Exceptional Conditions)
The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
755
(Improper Handling of Exceptional Conditions)
The product does not handle or incorrectly handles an exceptional condition.
1450
(Weaknesses in OWASP Top Ten RC1 (2025)) >
1445
(OWASP Top Ten 2025 Category A10:2025 - Mishandling of Exceptional Conditions) >
756
(Missing Custom Error Page)
The product does not return custom error pages to the user, possibly exposing sensitive information.
Maintenance
As of CWE 4.19, the relationships in this view were pulled directly from the CWE mappings cited in the 2025 OWASP Top Ten RC1. These mappings include categories and high-level weaknesses. One mapping to a deprecated entry was removed. The CWE Program will work with OWASP to improve these mappings, possibly requiring modifications to CWE itself.
More information is available — Please edit the custom filter or select a different filter. |
|
Use of the Common Weakness Enumeration (CWE™) and the associated references from this website are subject to the Terms of Use. CWE is sponsored by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and managed by the Homeland Security Systems Engineering and Development Institute (HSSEDI) which is operated by The MITRE Corporation (MITRE). Copyright © 2006–2025, The MITRE Corporation. CWE, CWSS, CWRAF, and the CWE logo are trademarks of The MITRE Corporation. |
||

