Home  /  Blog  /  Web Application Penetration Testing: OWASP Top 10 (2025) Pra

● VAPT

Web Application Penetration Testing: OWASP Top 10 (2025) Practical Guide for Indian Developers

OWASP Top 10 is the baseline for web app security testing. What each category actually means in practice, how Indian developers should test for it, and where modern web apps (React/Vue SPA, GraphQL APIs, Cloudflare-fronted) introduce twists the textbook explanations miss.

Published 20 May 2026 14 min read Codesecure VAPT Team VAPT

Key Takeaways

  • OWASP Top 10 is the baseline, not the ceiling. Manual pentest goes beyond the categories to find chained exploits, business logic flaws and identity issues that the framework hints at but does not enumerate.
  • Top categories in Indian web app pentests (frequency): Broken Access Control, Injection (SQL/NoSQL/Command), Cryptographic Failures, Identification & Authentication Failures, Vulnerable Components.
  • Modern web apps (React/Vue SPA + GraphQL API + Cloudflare/Vercel/Netlify) introduce twists: client-side authorisation, IDOR through GraphQL nested fields, edge function bypass.
  • Audit-ready reports map each finding to OWASP category, CWE, CVSS v3.1 score, business impact, remediation guidance.
  • Free retest within 90 days is standard for Codesecure web app pentests so fixes can be validated for audit closure.

Why OWASP Top 10 Is Useful (and Where It Falls Short)

The OWASP Top 10 is the most widely-cited web application security awareness framework. The 2025 release continues the focus on application logic and business impact rather than purely technical vulnerability categories. Auditors, customers and regulators all reference it. Every Indian web app pentest report should map findings to OWASP categories.

Where OWASP Top 10 is useful: as a shared vocabulary between developers, security testers, auditors and management. As a checklist of must-test categories that no manual pentest should skip. As a reporting structure that buyers and auditors understand.

Where it falls short: it does not enumerate specific vulnerabilities, attack techniques or test cases. A real pentest finds 30-60 distinct issues that all map to OWASP categories but are far more specific. Business logic flaws, chained exploits and identity issues hide under broad OWASP buckets and require manual expertise to find.

OWASP Top 10 (2025) Categories: Practical Testing Approach

A01: Broken Access Control

The most common high-severity finding in Indian web app pentests. Tested via: horizontal IDOR (access another user's resource by changing ID parameter), vertical IDOR (regular user accessing admin function), missing authorisation on API endpoints (backend trusts client-side role enforcement), forced browsing to unlinked admin paths, JWT manipulation (algorithm confusion, weak signing keys, claim tampering). Modern SPA + API apps frequently have authorisation enforced only on the front-end with backend trusting client claims, a common high-severity finding.

A02: Cryptographic Failures

Tested via: weak hashing (MD5, SHA1 for passwords, unsalted hashes), weak TLS configuration (TLS 1.0/1.1 enabled, weak ciphers RC4/3DES, expired or self-signed certificates), missing HSTS, missing secure cookie flags, sensitive data in URLs or query strings, hardcoded keys in client-side code or repositories. Modern Indian SaaS apps often inherit cryptographic posture from cloud defaults (AWS/Azure/GCP) which is decent baseline but rarely tuned for the specific application threat model.

A03: Injection (SQL, NoSQL, OS Command, LDAP)

Despite ORMs and frameworks, injection remains common. Tested via: blind SQL injection on parameters that look safe (sort, search, filter), NoSQL injection on MongoDB/DynamoDB-backed APIs (operator injection), OS command injection on file processing endpoints, LDAP injection on authentication systems, template injection on report generation features. Server-side template injection (SSTI) on Jinja2/Twig/Handlebars-based reports is a frequent finding in Indian SaaS with custom reporting features.

A04: Insecure Design

Architectural and design-level issues rather than implementation bugs. Tested via: missing rate limiting on login, password reset, OTP endpoints (enables credential stuffing and OTP brute-force), weak account recovery flows (security questions, predictable tokens), business logic abuse (race conditions on payment, coupon stacking, refund abuse), insecure direct API design (over-fetching, under-protecting). These are not in scanner output; they require manual analysis of the application flow.

A05: Security Misconfiguration

Tested via: exposed admin interfaces (jenkins, kibana, swagger, phpmyadmin on internet), verbose error messages leaking stack traces or DB schema, missing security headers (CSP, X-Frame-Options, X-Content-Type-Options, Referrer-Policy), default credentials on management interfaces, directory listing enabled on static asset directories, misconfigured CORS allowing arbitrary origins. Cloud misconfigurations (open S3 buckets, public storage containers, exposed metadata services) are tested under cloud configuration audit but often discovered during web app pentest.

A06: Vulnerable and Outdated Components

Tested via: dependency vulnerability scanning against known CVEs (npm audit, pip audit, snyk, Trivy), framework version disclosure in HTTP headers and error pages, verification that vulnerable libraries are actually exploitable in the application context. Not every CVE in node_modules is exploitable; the pentest filters real exploitable issues from theoretical vulnerabilities for which there is no exploitation path.

A07: Identification and Authentication Failures

Tested via: weak password policy (allows '123456', no complexity), username enumeration on login/signup/password-reset, missing or weak MFA on sensitive flows, session management flaws (predictable session tokens, missing session timeout, session fixation), OAuth/SAML implementation issues (open redirect, JWT confusion, weak signing keys), SSO bypass via direct authentication endpoints. Modern Indian SaaS apps with SSO/Okta/Azure AD integration frequently have direct-login endpoints that bypass SSO; this is a high-severity finding.

A08: Software and Data Integrity Failures

Tested via: insecure deserialisation on Java/Python/Ruby applications (Pickle, Hessian, ObjectInputStream), auto-update mechanisms without signature verification, CI/CD pipeline trust issues (unsigned artifacts, untrusted plugins), JavaScript supply chain risk (loading third-party scripts from CDNs without SRI). Frequent finding in older Indian enterprise Java applications.

A09: Security Logging and Monitoring Failures

Tested via: verification that security-relevant events are logged (failed logins, MFA challenges, privilege changes, admin actions), integration with centralised SIEM, alerting on suspicious patterns. This category is typically tested via interview + log inspection rather than active probing. Important for SOC 2 CC7.2/CC7.3 evidence and ISO 27001 A.8.15/A.8.16 controls.

A10: Server-Side Request Forgery (SSRF)

Tested via: SSRF on URL parameters (webhook configuration, image upload by URL, PDF generation, OAuth callback validation), blind SSRF detection via out-of-band channels (Burp Collaborator, custom DNS canaries), SSRF to cloud metadata endpoints (169.254.169.254 on AWS, 100.100.100.200 on Alibaba, custom on Azure/GCP). Cloud metadata SSRF is a high-severity finding in Indian SaaS hosted on AWS without IMDSv2 enforcement.

Need a Pentest Engagement?

Codesecure runs manual + AI-augmented VAPT for Indian businesses: web, API, mobile, network, cloud, AD, IoT, source code. Named OSCP/CEH/CISSP consultants, ISO/IEC 27001:2022 certified delivery, free retest within 90 days.

See Pentest Services →

Modern Web App Twists: SPA, GraphQL, Edge Functions

Single-Page Applications (React, Vue, Angular, Svelte)

SPA frontends with REST/GraphQL backends are now standard in Indian SaaS. Key pentest concerns: client-side authorisation (frontend role enforcement that backend ignores), JavaScript secret exposure (API keys, signing secrets in bundles), routing-based access control bypass (deep linking to protected views without server check), JWT handling (storage in localStorage vs httpOnly cookie). Use browser dev tools, Burp Suite proxy, and manual code review of bundled JavaScript.

GraphQL APIs

GraphQL changes the pentest playbook. Key concerns: introspection-based attacks (use introspection to map full schema, identify hidden mutations), nested IDOR through related fields (a query that fetches user.organisation.members can leak across tenants if authorisation is per-query not per-field), query depth/cost abuse (DoS via deeply nested queries), batching abuse (rate limit bypass through batched queries). Disable introspection in production; implement per-field authorisation, not per-query.

Cloudflare / Vercel / Netlify / Edge Functions

Modern Indian SaaS often deploys on edge platforms (Cloudflare Workers, Vercel Edge Functions, Netlify Functions). Key concerns: origin server bypass if the origin's IP is discoverable (DNS history, certificate transparency leaks), edge function authorisation (function trusts headers Cloudflare strips for non-edge requests), cache poisoning via header manipulation, misconfigured page rules exposing admin paths to direct origin access. We test both edge and origin endpoints.

SHARE

Frequently Asked Questions

How long does a typical web app pentest take in India?

1-2 weeks for a single application with 30-40 features under OWASP Top 10 + business logic testing methodology. 2-3 weeks for multi-product platforms, multi-tenant SaaS, or e-commerce with payment flows. 3-4 weeks for large enterprise apps with extensive role hierarchies and microservices backends. Plus 1 week for report finalisation and another 1 week for free retest within 90 days when fixes are ready.

Do we need OWASP Top 10 alignment in our pentest report or is general findings format okay?

OWASP Top 10 alignment is strongly recommended. Indian and global auditors (ISO 27001, SOC 2, PCI DSS), enterprise customer security teams, and bug bounty triagers all use OWASP as common vocabulary. A report that maps findings to OWASP categories plus CWE plus CVSS gives the broadest audience compatibility. Codesecure reports always include this multi-framework mapping.

Is OWASP Top 10 enough or should we also test for OWASP API Top 10?

Both. OWASP Top 10 covers web application categories; OWASP API Top 10 covers API-specific issues that overlap but extend (excessive data exposure, mass assignment, lack of resources/rate limiting, improper assets management). For modern Indian SaaS with React/Vue SPA + REST or GraphQL backend, we test against both frameworks in the same engagement.

What are the most common high-severity web app findings in India in 2026?

Top five by frequency in Codesecure 2026 engagements: (1) Broken Access Control via authorisation gaps on backend APIs while frontend enforces role, (2) SSRF to cloud metadata endpoints on AWS without IMDSv2 enforcement, (3) Server-Side Template Injection on custom reporting features, (4) JWT signing key weaknesses or algorithm confusion, (5) GraphQL nested IDOR through related fields when authorisation is per-query rather than per-field.

Should developers also run OWASP ZAP or similar automated tools themselves?

Yes, between pentest engagements. Automated tools (OWASP ZAP, Burp Suite community, Nuclei) catch the obvious issues continuously and are cheap. They are NOT a substitute for annual manual pentest, but they are a useful complement that shrinks the surface area pentest needs to cover. Integrate ZAP into CI/CD with baseline scans on every release.

Will the pentest cause downtime for our production web app?

Standard pentest methodology is non-disruptive. We use rate-limited probes, exclude destructive techniques, avoid DoS testing unless explicitly scoped. Production pentest is common; staging-only pentest is fine if staging accurately mirrors production. Risk of accidental disruption is low; we coordinate maintenance windows for high-risk tests (rate limit boundary testing, large file upload testing).

Will the pentest report satisfy our SOC 2 / ISO 27001 auditor?

Yes. Codesecure web app pentest reports map findings to OWASP Top 10, OWASP API Top 10, CWE, CVSS v3.1, MITRE ATT&CK and the specific control families (SOC 2 CC7.x, ISO 27001 A.8.x). Indian and global auditors (Big 4, mid-tier CPAs, ISO certification bodies) routinely accept our reports as pentest evidence. Free retest within 90 days provides closure evidence for any findings remediated.

CS

Codesecure VAPT Team

OSCP / CEH / CISSP Certified Penetration Testers

Codesecure Solutions is ISO/IEC 27001:2022 certified and runs manual + AI-augmented VAPT engagements across web, API, mobile, network, cloud, Active Directory, source code, IoT and thick client. Named consultants, fixed-fee proposals, free retest within 90 days. 150+ businesses secured globally.

✓ ISO/IEC 27001:2022 Certified

Get a Comprehensive Web App Pentest Aligned to OWASP Top 10

Codesecure runs manual + AI-augmented web app pentests covering OWASP Top 10, OWASP API Top 10, ASVS controls and business logic. Named OSCP/CEH/CISSP consultants, ISO/IEC 27001:2022 certified delivery, free retest within 90 days.