OWASP Risk Calculator
Calculate security risk severity using the OWASP Risk Rating Methodology
Likelihood Score
Impact Score
Overall Risk Severity
Application & Vulnerability Information
Risk Vector String
(SL:1/M:1/O:0/S:2/ED:1/EE:1/A:1/ID:1/LC:2/LI:1/LAV:1/LAC:1/FD:1/RD:1/NC:2/PV:3)This vector string can be shared with stakeholders for tracking and reproducing the risk assessment.
Likelihood Factors
Red: Threat Agent | Blue: Vulnerability
Risk Severity Gauge
Overall Risk Score (0-9 scale)
Impact Factors
Purple: Technical | Orange: Business
Threat Agent Factors
Skill Level
Motive
Opportunity
Size
Vulnerability Factors
Ease of Discovery
Ease of Exploit
Awareness
Intrusion Detection
Technical Impact Factors
Loss of Confidentiality
Loss of Integrity
Loss of Availability
Loss of Accountability
Business Impact Factors
Financial Damage
Reputation Damage
Non-Compliance
Privacy Violation
About OWASP Risk Rating Methodology
This calculator implements the official OWASP Risk Rating Methodology, providing a systematic and repeatable approach to calculating security risk severity. It helps organizations make informed decisions about security investments by quantifying both the likelihood of successful attacks and their potential business impact.
🎯 Likelihood Factors
- • Skill Level
- • Motive
- • Opportunity
- • Size
- • Ease of Discovery
- • Ease of Exploit
- • Awareness
- • Intrusion Detection
💼 Impact Factors
- • Confidentiality Loss
- • Integrity Loss
- • Availability Loss
- • Accountability Loss
- • Financial Damage
- • Reputation Damage
- • Non-Compliance
- • Privacy Violation
⚡ Risk Severity Scale
- • 0-3: LOW
- • 3-6: MEDIUM
- • 6-9: HIGH
- • NOTE: Low/Low
- • LOW: Mixed Low/Med
- • MEDIUM: Med/Med
- • HIGH: High impact
- • CRITICAL: High/High
💡 Business Value: This methodology enables security teams to communicate risks in business terms, prioritize remediation efforts effectively, and make data-driven decisions about security investments aligned with organizational risk appetite.
