web_security_owasp 30 Q&As

Web Security OWASP FAQ & Answers

30 expert Web Security OWASP answers researched from official documentation. Every answer cites authoritative sources you can verify.

unknown

30 questions
A

A01 Broken Access Control (remains #1, 3.73% average detection rate across 40 CWEs), A02 Cryptographic Failures, A03 Software Supply Chain Failures (NEW - expands 2021's Vulnerable Components, covers dependencies, build systems, distribution), A04 Injection (includes SQL, NoSQL, OS command, XPath, ORM injection), A05 Insecure Design, A06 Security Misconfiguration, A07 Identification and Authentication Failures, A08 Software and Data Integrity Failures, A09 Security Logging and Monitoring Failures, A10 Mishandling of Exceptional Conditions (NEW - 24 CWEs for error handling, failing open, logical errors). OWASP Top 10:2025 RC1 released Nov 6, 2025, analyzing 2.8M+ applications across 589 CWEs (vs 400 in 2021). Final version expected 2026.

99% confidence
A

CSP is HTTP header providing allowlist-based control over resource loading to defend against Cross-Site Scripting (XSS) attacks. OWASP 2025 recommends Strict CSP using nonces or hashes. Nonce-based (server-rendered pages): Content-Security-Policy: script-src 'nonce-{RANDOM}' 'strict-dynamic'; object-src 'none'; base-uri 'none'. Hash-based (static pages, SPAs): Content-Security-Policy: script-src 'sha256-{HASH}' 'strict-dynamic'; object-src 'none'; base-uri 'none'. strict-dynamic allows nonce/hash-verified scripts to load additional scripts without explicit allowlisting. Critical: Use cryptographically secure random token for nonces (unique per HTTP response), never use unsafe-inline in production. Framework protections + output encoding + CSP provide defense-in-depth. DOMPurify recommended for HTML sanitization. CSP Level 3 supported in modern browsers (2025).

99% confidence
A

XSS is injection attack where malicious scripts execute in victim's browser. Three types: Stored (persistent in database, highest impact), Reflected (in URL/request parameters), DOM-based (client-side JavaScript manipulation, never touches server). OWASP 2025 prevention hierarchy: (1) Framework Security - Use modern frameworks with auto-escaping (React JSX, Vue templates, Angular - avoid dangerouslySetInnerHTML/bypassSecurityTrustHtml without DOMPurify). (2) Output Encoding - Context-specific encoding critical (HTML entity encoding for HTML context, JavaScript encoding for