OWASP Top 10

The OWASP Top 10 is the most widely recognized standard for web application security risks. ByteHide Radar maps every SAST finding to the relevant OWASP categories: the Top 10 2025, Top 10 2021, and Top 10 for LLM Applications 2025, helping teams align their security efforts with industry standards and compliance requirements.


Supported OWASP Standards

Radar maps findings to the following OWASP standards:

StandardEditionFocus
OWASP Top 102025Web application security risks (latest)
OWASP Top 102021Web application security risks (widely referenced in compliance)
OWASP Top 10 for LLM Applications2025AI and Large Language Model security risks

Findings may map to categories in multiple standards simultaneously. For example, an SQL injection finding maps to both A05:2025 and A03:2021.

Compliance Alignment

Many compliance frameworks (PCI DSS, SOC 2, ISO 27001) reference the OWASP Top 10 directly or indirectly. Tracking your Radar findings by OWASP category provides ready-made evidence for audits and security assessments.


OWASP Top 10 2025 (Web)

Released in November 2025, based on analysis of over 175,000 CVE records. Two new categories were introduced and several were reorganized.

IDCategoryChange from 2021
A01:2025Broken Access ControlSame position. SSRF (A10:2021) merged in
A02:2025Security MisconfigurationMoved up from A05:2021
A03:2025Software Supply Chain FailuresNew. Replaces A06:2021 with broader scope
A04:2025Cryptographic FailuresMoved down from A02:2021
A05:2025InjectionMoved down from A03:2021
A06:2025Insecure DesignMoved down from A04:2021
A07:2025Authentication FailuresRenamed from A07:2021
A08:2025Software or Data Integrity FailuresSame position
A09:2025Security Logging and Alerting FailuresRenamed from A09:2021
A10:2025Mishandling of Exceptional ConditionsNew. Improper error handling, failing open

OWASP Top 10 for LLM Applications 2025

Dedicated to security risks in AI-powered applications. Radar's SAST engine detects code-level vulnerabilities that map to these LLM-specific risks.

IDCategoryDescription
LLM01:2025Prompt InjectionUntrusted input manipulates LLM behavior
LLM02:2025Sensitive Information DisclosurePrivate data exposed through LLM interactions
LLM03:2025Supply ChainVulnerabilities in AI dependencies and models
LLM04:2025Data and Model PoisoningManipulated training data introduces backdoors
LLM05:2025Improper Output HandlingLLM output used unsafely in downstream systems
LLM06:2025Excessive AgencyAI agents with unrestricted permissions
LLM07:2025System Prompt LeakageSystem prompts exposed to end users
LLM08:2025Vector and Embedding WeaknessesRAG pipeline vulnerabilities
LLM09:2025MisinformationLLM generates false but credible content
LLM10:2025Unbounded ConsumptionMissing resource controls on LLM calls

LLM + Traditional Risks

Many LLM vulnerabilities overlap with traditional OWASP categories. For example, LLM05 (Improper Output Handling) often results in injection vulnerabilities (A05:2025) when LLM output flows into SQL, HTML, or OS commands. Radar flags these with both OWASP and LLM category tags.


OWASP Top 10 2021 (Web)

The 2021 edition remains widely referenced in compliance programs. See the 2021 Reference for the full mapping between 2021 and 2025 categories.

2021 IDCategory2025 Mapping
A01:2021Broken Access Control→ A01:2025
A02:2021Cryptographic Failures→ A04:2025
A03:2021Injection→ A05:2025
A04:2021Insecure Design→ A06:2025
A05:2021Security Misconfiguration→ A02:2025
A06:2021Vulnerable and Outdated Components→ A03:2025 (Supply Chain Failures)
A07:2021Identification and Authentication Failures→ A07:2025
A08:2021Software and Data Integrity Failures→ A08:2025
A09:2021Security Logging and Monitoring Failures→ A09:2025
A10:2021Server-Side Request Forgery (SSRF)→ Merged into A01:2025

Using OWASP Filters in Radar

Filtering by Category

  1. Navigate to your Radar project's SAST tab
  2. Click the OWASP filter in the filter bar
  3. Select one or more categories (e.g., "A01:2025", "A05:2025", "LLM01:2025")
  4. The findings table updates to show only matching vulnerabilities
  5. Combine with the Severity filter to focus on Critical and High findings

ByteHide Radar SAST tab showing detection summary with severity breakdown, filters for Status Severity CWE and OWASP, and findings table with fingerprint title severity status location and AutoFix columnsClick to expand

Compliance Reporting

OWASP category mapping enables streamlined compliance reporting:

  • PCI DSS requires that all OWASP Top 10 vulnerabilities be addressed in payment-processing applications
  • SOC 2 security criteria can be mapped to OWASP categories for evidence collection
  • ISO 27001 Annex A controls align with several OWASP categories

Export filtered findings by OWASP category to generate evidence reports for auditors.

Tracking Progress

  • Monitor the count of open findings per OWASP category across scan cycles
  • Identify which categories have the most recurring findings, indicating systemic issues
  • Set team goals to achieve zero Critical findings in specific OWASP categories

Beyond the Top 10

The OWASP Top 10 is a starting point, not a comprehensive checklist. Radar detects vulnerabilities beyond these categories, including ReDoS, prototype pollution, information leakage, and other weaknesses. Use the CWE filter for more granular classification.


Next Steps

CWE Reference

CWE identifiers used to classify SAST findings.

View SAST Findings

Navigate and filter the SAST findings table.

Triage and Remediation

Review, prioritize, and resolve findings.

Previous
CWE Reference