Using the STRIDE methodology, we categorised threats against the OWASP Juice Shop and identified the associated mitigations. Each card below summarises typical attacks and defences for a given category.
The matrix below rates the likelihood and impact of each identified vulnerability, yielding an overall risk level.
| Vulnerability | Likelihood | Impact | Risk Level |
|---|---|---|---|
| SQL Injection Login Bypass | High | High | Critical |
| Weak Admin Password | High | High | High |
| Reflected XSS | Medium | High | High |
| DOM‑based XSS | Medium | Medium | Medium |
| Confidential Document Exposure | Medium | Medium | Medium |
| FTP Directory Listing | Medium | Low | Low |
| Scoreboard Access | High | Medium | High |
| Stack Trace Leak | Low | Low | Low |
Understanding how data flows through the Juice Shop helps prioritise defences. Entry points, trust boundaries and data flows are summarised below.
Security improvements should be prioritised over immediate, short‑term and long‑term horizons.