Skip to Content
Detectify for ComplianceCompliance FrameworksOWASP Top 10

OWASP Top 10

What it is — The OWASP Top 10 is a standard awareness document for web application security, published by the Open Worldwide Application Security Project (OWASP) . It represents the most critical security risks to web applications, based on broad consensus from security experts worldwide. The current version is OWASP Top 10:2025 .

Appsec relevance — The OWASP Top 10 is entirely focused on web application security. It is the most widely referenced application security standard and is used as a baseline by auditors, procurement teams, and compliance frameworks including PCI DSS.

How Detectify Supports the OWASP Top 10:2025

Detectify includes a built-in OWASP Top 10 pass/fail report view per scan, mapping each finding to its corresponding OWASP Top 10 category.

OWASP CategoryWhat it coversDetectify CoverageKey CWEsCoverage
A01:2025  Broken Access ControlRestrictions on authenticated users are not properly enforced, allowing access to unauthorized functions or data. Now includes SSRF and open redirectsAuthentication bypass, authorization flaws, path traversal, CSRF, SSRF, open redirect detectionCWE-284 , CWE-287 , CWE-306 , CWE-352 , CWE-22 , CWE-23 , CWE-918 , CWE-601 Full
A02:2025  Security MisconfigurationIncorrect security hardening across the application stack, including default configurations, verbose errors, and XML external entity attacksDefault credentials, exposed admin panels, directory listings, verbose error messages, header misconfigurations, XXE detectionCWE-16 , CWE-200 , CWE-548 , CWE-611 Full
A03:2025  Software Supply Chain FailuresBreakdowns in the process of building, distributing, or updating software, including vulnerable or malicious third-party dependenciesTechnology fingerprinting via Surface Monitoring, CVE-specific test modules generated by Alfred AI, Crowdsource modules for known component vulnerabilitiesComponent detection + CVE-specific payload testsPartial
A04:2025  Cryptographic FailuresFailures related to cryptography that lead to exposure of sensitive data or system compromiseWeak encryption detection, cleartext storage and transmission, TLS/SSL configuration testingCWE-326 , CWE-312 , CWE-319 , CWE-327 Partial
A05:2025  InjectionUser-supplied data is sent to an interpreter as part of a command or query, enabling attackers to execute unintended commandsSQL injection, XSS, OS command injection, template injection, code injection, NoSQL injectionCWE-89 , CWE-79 , CWE-78 , CWE-94 , CWE-1336 , CWE-943 Full
A06:2025  Insecure DesignDesign and architectural flaws that cannot be fixed by correct implementation, including missing security controlsDetects some consequences of insecure design (e.g. unrestricted file upload, insufficient credential protection) but cannot assess design decisionsCWE-434 , CWE-522 Partial
A07:2025  Authentication FailuresWeaknesses in authentication and session management that allow attackers to compromise credentials or sessionsSession management testing, credential validation, authentication bypass, default credential detectionCWE-287 , CWE-306 , CWE-288 , CWE-798 , CWE-613 Partial
A08:2025  Software or Data Integrity FailuresCode and infrastructure that does not protect against integrity violations, including insecure deserializationInsecure deserialization detection, integrity verification testingCWE-502 , CWE-345 Partial
A09:2025  Security Logging and Alerting FailuresInsufficient logging, detection, monitoring, and active response to security eventsNot a primary DAST capability — Detectify detects some information leakage via logs but cannot assess logging completenessCWE-532 Limited
A10:2025  Mishandling of Exceptional ConditionsImproper error handling, logical errors, failing open, and other scenarios stemming from abnormal conditions (new for 2025)Detects verbose error messages, improper handling of exceptional conditionsCWE-209 , CWE-755 Partial

What Detectify Covers

Detectify provides strong coverage across the OWASP Top 10:2025, with full coverage for Broken Access Control (A01), Security Misconfiguration (A02), and Injection (A05). The built-in OWASP Top 10 report view makes it straightforward to assess and demonstrate compliance against this standard.

Key change from 2021: SSRF (previously its own category at A10:2021) is now part of A01:2025 Broken Access Control, where Detectify has 181 SSRF-specific tests. Software Supply Chain Failures (A03:2025) expands the former “Vulnerable and Outdated Components” category to cover the full supply chain — Detectify provides partial coverage through component detection and CVE-specific testing.

Coverage gaps exist for Insecure Design (A06), which requires threat modeling and secure design practices, and Security Logging and Alerting Failures (A09), which requires log management infrastructure.

Complementary Tools You May Need

  • Threat modeling tools — For addressing A06:2025 Insecure Design
  • SAST — For deeper code-level injection and cryptographic analysis
  • Log management and SIEM — For A09:2025 Security Logging and Alerting Failures
  • Software composition analysis (SCA) — For comprehensive A03:2025 supply chain coverage beyond runtime detection

References

Last updated on