Skip to main content
JG is here with you ✨
A03:2025

Software Supply Chain Failures

OWASP Top 10 - NEW Category for 2025

NEW in 2025

What are Software Supply Chain Failures?

Supply chain failures occur when malicious or vulnerable code enters your application through third-party dependencies, compromised build systems, or tampered distribution channels. A single compromised package can affect millions of applications.

NEW in OWASP 2025SolarWinds, Log4j, XZ UtilsTransitive Dependencies

Malicious Packages

Attackers publish packages with harmful code or hijack existing ones

Examples: event-stream, ua-parser-js

Typosquatting

Packages with names similar to popular libraries to trick developers

Examples: lodahs, reacct, axois

Dependency Confusion

Exploiting package manager resolution to inject malicious code

Examples: Internal package name collision

Compromised Build

Attackers infiltrate CI/CD pipelines to inject backdoors

Examples: SolarWinds, Codecov

Vulnerable Components

Using libraries with known security vulnerabilities

Examples: Log4j, Struts, OpenSSL

Unmaintained Packages

Dependencies no longer receiving security updates

Examples: Abandoned npm packages

Major Supply Chain Attacks

SolarWinds Orion2020
Build System CompromiseCI/CD Pipeline

Attackers compromised the build pipeline to inject SUNBURST backdoor into software updates

Impact: 18,000+ organizations
Log4Shell (Log4j)2021
Vulnerable ComponentTransitive Dependency

Critical RCE vulnerability in widely-used logging library allowed arbitrary code execution

Impact: Millions of applications
ua-parser-js2021
Account TakeoverNPM Package

Maintainer account compromised, malicious versions published with cryptominer

Impact: 7M+ weekly downloads
XZ Utils Backdoor2024
Social EngineeringOpen Source Maintainer

Multi-year social engineering attack to become maintainer and insert SSH backdoor

Impact: Linux distributions
Codecov Bash Uploader2021
Script TamperingCI/CD Script

Modified bash script exfiltrated environment variables and secrets from CI pipelines

Impact: 29,000+ customers
event-stream2018
Maintainer HandoffNPM Package

New maintainer added malicious dependency targeting Bitcoin wallets

Impact: 2M+ weekly downloads

Related CWE Entries

Built by an OWASP Member • Part of the OWASP Web Security Lab Series

Open to AI-Focused Roles

AI Sales • AI Strategy • AI Success • Creative Tech • Toronto / Remote

Let's connect →
Terms of ServiceLicense AgreementPrivacy Policy
Copyright © 2026 JMFG. All rights reserved.