
Research
2025 Report: Destructive Malware in Open Source Packages
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.
org.owasp.esapi:esapi
Advanced tools
The Enterprise Security API (ESAPI) project is an OWASP project to create simple strong security controls for every web platform. Security controls are not simple to build. You can read about the hundreds of pitfalls for unwary developers on the OWASP web site. By providing developers with a set of strong controls, we aim to eliminate some of the complexity of creating secure web applications. This can result in significant cost savings across the SDLC.
| OWASP® ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library that makes it easier for programmers to write lower-risk applications. The ESAPI for Java library is designed to make it easier for programmers to retrofit security into existing applications. ESAPI for Java also serves as a solid foundation for new development. |
IMPORTANT: We are aware that all versions of ESAPI (unless you are using very select parts) do not work with Jakarta EE. Jakarta EE relies on jakarta.servlet-api. ESAPI is built to use javax.servlet-api. This causes things like Spring Boot 3, Spring 6, Tomcat 10, the latest version of Jetty, etc. to fail to load certain (well, many) ESAPI classes. The reason for this is that the package names between these 2 libraryes are different! The dependency javax.servlet-api has a package namespace of javax.servlet. The jakarta.servlet-api library is using the package namespace of jakarta.servlet. So references to things like ServletRequest, ServletResponse, etc. in ESAPI are using javax.servlet.ServletRequest and javax.servlet.ServletResponse respectively. We cannot make it work for both at once and we will not stop supporting javax.servlet-api, which is what most of our existing ESAPI clients are using.
Therefore PLEASE STOP sending us emails and/or creating GitHub issues regarding this! Instead, please read ongoing the GitHub discussion https://github.com/ESAPI/esapi-java-legacy/discussions/768 for further details. |
A summary of all the vulnerabilities that we have written about in either the ESAPI Security Bulletins or in the GitHub Security Advisories may be found in this Vulnerability Summary. It is too lengthy, and if you are using the latest available ESAPI version--generally not relevant--to place in this README file.
You can find the official OWASP ESAPI Project wiki pages at https://owasp.org/www-project-enterprise-security-api/. The ESAPI legacy GitHub repo also has several useful wiki pages.
This is the legacy branch of ESAPI which means it is an actively maintained branch of the project, however significant new feature development for this branch will not be done. Features that have already been scheduled for the 2.x branch will move forward. Development for the "next generation" of ESAPI (starting with ESAPI 3.0), will be done at the GitHub repository at https://github.com/ESAPI/esapi-java.
IMPORTANT NOTES:
As mentioned above, you can find it at https://github.com/ESAPI/esapi-java.
Note however that work on ESAPI 3 has not yet begun in earnest and is only in its earliest planning stages. Even the code that is presently there will likely change.
The ESAPI release notes may be found in ESAPI's "documentation" directory. They are generally named "esapi4java-core-2.#.#.#-release-notes.txt", where "2.#.#.#" refers to the ESAPI release number (which uses semantic versioning).
See the GitHub Releases information for a list of releases which generally link to the specific release notes.
The latest ESAPI release is 2.5.2.0. All the regular ESAPI jars, with the exception of the ESAPI configuration jar (i.e., esapi-2.#.#.#-configuration.jar) and its associated detached GPG signature, are available from Maven Central. The ESAPI configuration jars are linked under the 'Assets' section to each of the specific ESAPI releases under the GitHub Releases page.
However, before you start a new project using ESAPI, but sure to read "Should I use ESAPI?".
Unless we unintentionally screw-up, our intent is to keep classes, methods, and/or fields which have been annotated as "@deprecated" for a minimum of two (2) years or until the next major release number (e.g., 3.x as of now), which ever comes first, before we remove them. Note that this policy does not apply to classes under the org.owasp.esapi.reference package. You generally are not expected to be using such classes directly in your code. At the ESAPI team's discretion, it will also not apply for any known exploitable vulnerabilities for which no available workaround exists.
IMPORTANT NOTES: As of ESAPI 2.5.0.0, all the Log4J 1.x related code has been removed from the ESAPI code base (with the exception of some references in documentation). If you must, you still should be able to use Log4J 1.x logging via ESAPI SLF4J support. See the ESAPI 2.5.0.0 release notes for further details.
Fork and submit a pull request! Easy as pi! (How's that for an irrational statement, you math nerds? :) We generally only accept bug fixes, not new features because as a legacy project, we don't intend on adding new features that we will have to maintain long term (although we may make exceptions; see the 'New Features' section in this README). If you are interesting in doing bug fixes though, the best place to start is the CONTRIBUTING-TO-ESAPI.txt
If you are new to ESAPI, a good place to start is to look for GitHub issues labled as 'good first issue'. (E.g., to find all open issues with that label, use https://github.com/ESAPI/esapi-java-legacy/issues?q=is%3Aissue+is%3Aopen+label%3A%22good+first+issue%22.)
Again, please find additional important details in the file 'CONTRIBUTING-TO-ESAPI.txt', which will also describe the tool requirements.
If you have found a bug, then create an issue on the esapi-legacy-java repo at https://github.com/ESAPI/esapi-java-legacy/issues As of May 11, 2022, we switched back to using (GitHub) issue templates. (We previously used issue templates when our source code repository was still on Google Code.) You can read more about our issue templates in this brief announcement.
NOTE: Please do NOT use GitHub issues to ask questions about ESAPI. If you wish to ask questions, instead, post to either of the 2 mailing lists (now on Google Groups) found the References section at the bottom of this page. If we find questions posted as GitHub issues, we simply will close them and direct you to do this anyhow. Alternately you may use the new Q&A section of our GitHub Discussions page to ask questions.
When reporting an issue or just asking a question, please be clear and try to ensure that the ESAPI development team has sufficient information to be able to reproduce your results or to understand your question. If you have not already done so, this might be a good time to read Eric S. Raymond's classic "How to Ask Questions the Smart Way" before posting your issue.
If believe you have found a vulnerability in ESAPI legacy, for the sake of the ESAPI community, please practice Responsible Disclosure. (Note: We will be sure you get credit and will work with you to create a GitHub Security Advisory, and if you so choose, to pursue filing a CVE via the GitHub CNA.)
You are of course encouraged to first search our GitHub issues list (see above) to see if it has already been reported. If it has not, then please contact both Kevin W. Wall (kevin.w.wall at gmail.com) and Matt Seil (matt.seil at owasp.org) directly. Please do not report vulnerabilities via GitHub issues or via the ESAPI mailing lists as we wish to keep our users secure while a patch is implemented and deployed. If you wish to be acknowledged for finding the vulnerability, then please follow this process. Also, when you post the email describing the vulnerability, please do so from an email address that you usually monitor.
More detail is available in the file 'SECURITY.md'. https://raw.githubusercontent.com/ESAPI/esapi-java-legacy/blob/develop/SECURITY.md)'.
If you wish to propose a new feature, the best place to discuss it is via new 'Discussions' board, probably under 'Ideas', or on the ESAPI-DEV mailing list mentioned below under the References section. As mentioned previously, we generally are not considering new features for ESAPI 2.x. This is because:
That said, if you believe you have an idea for an additional simple feature that does not pull in any additional 3rd party libraries, toss it out there for discussion or even show us how it works with a PR. (Note that we vet all pull requests, including coding style of any contributions, so please use the same coding style found in the files you are already editing.)
In mid-2014 ESAPI migrated all code and issues from Google Code to GitHub. This migration was completed in November 2014.
All issues from Google Code have been migrated to GitHub issues. We now use GitHut Issues for reporting everything except security vulnerabilities. Other bug tracking sites are undoubtedly more advanced, but as developers, we do not want to spent time having to close issues from multiple bug-tracking systems. Therefore, until the synchronization happens with the Atlassian Jira instance that we have (but are not using; see GitHub issue #371), please ONLY use GitHub Issues for reporting bugs.
OWASP Wiki: https://owasp.org/www-project-enterprise-security-api/
GitHub ESAPI Wiki: https://github.com/ESAPI/esapi-java-legacy/wiki
General Documentation: Under the 'documentation' folder.
OWASP Slack Channel: #owasp-esapi
GitHub Discussions: Discussions - Not a lot there yet, but we only started this on May 11, 2022.
Mailing lists:
OWASP is a registered trademark of the OWASP Foundation, Inc.
FAQs
Unknown package
We found that org.owasp.esapi:esapi demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.

Security News
Socket CTO Ahmad Nassri shares practical AI coding techniques, tools, and team workflows, plus what still feels noisy and why shipping remains human-led.

Research
/Security News
A five-month operation turned 27 npm packages into durable hosting for browser-run lures that mimic document-sharing portals and Microsoft sign-in, targeting 25 organizations across manufacturing, industrial automation, plastics, and healthcare for credential theft.