Skip to main content
JG is here with you ✨
A02:2025

Security Misconfiguration

OWASP Top 10 - #2 Most Critical Web Security Risk

High Severity

What is Security Misconfiguration?

Security misconfiguration is the most commonly seen issue in web applications. It occurs when security settings are defined, implemented, or maintained incorrectly. This includes default credentials, open cloud storage, verbose error messages, and unnecessary services.

Moved from #5 to #290% of apps have misconfigsOften automated scanning

Default Credentials

Using unchanged default usernames and passwords

Examples: admin/admin, root/root, guest/guest

Unnecessary Features

Unused ports, services, pages, or accounts enabled

Examples: Debug endpoints, sample apps, admin panels

Verbose Errors

Error messages revealing stack traces and internal info

Examples: SQL queries, file paths, server versions

Missing Headers

Security headers not configured properly

Examples: CSP, HSTS, X-Frame-Options missing

Cloud Storage

Publicly accessible S3 buckets and blob storage

Examples: Open S3, Azure Blob, GCS buckets

Outdated Software

Unpatched systems with known vulnerabilities

Examples: Old Apache, PHP, OpenSSL versions

Related CWE Entries

Real-World Impact

Capital One (2019)Critical

Misconfigured WAF exposed 100M records

Microsoft (2020)Critical

Exposed Bing search backend via open Elasticsearch

Twitch (2021)Critical

Misconfigured server exposed 125GB source code

Facebook (2019)Critical

Unprotected S3 bucket leaked 540M user records

Built by an OWASP Member • Part of the OWASP Web Security Lab Series

Open to AI-Focused Roles

AI Sales • AI Strategy • AI Success • Creative Tech • Toronto / Remote

Let's connect →
Terms of ServiceLicense AgreementPrivacy Policy
Copyright © 2026 JMFG. All rights reserved.