- Checkmarx Documentation
- Checkmarx One
- Release Notes
- Current Multi-Tenant Version | 3.56
Current Multi-Tenant Version | 3.56
New Features and Enhancements
General Availability: March 29, 2026
New Audit Log API with Expanded Event Coverage
Checkmarx One has launched a new audit log service with expanded coverage for a wide range of events across the platform. The new audit log is accessed using a new (REST) API, GET /audit-events. The new service adds new events for existing coverage for the Core platform and IAM (user management), and introduces logging for new areas, including Back Office and several scanners:
SCA
Container Security
DAST
BYOR
These improvements provide broader visibility into platform activity and strengthen auditability for security monitoring, compliance, and governance. Due to the expanded coverage, customers should expect a significant increase in the volume of audit events.
This API will replace the current Audit Trail REST API. The deprecated API will remain available for a 6 month transition period prior to being removed. We recommend taking steps to transition to the new audit log API as soon as possible.
Reports: Local Time Zone
Checkmarx One reports now display date-time values based on the user’s local time zone (instead of UTC). The applied time zone appears in the report header, and all date-time fields are adjusted accordingly.
When reports are generated through the UI, the browser’s time zone is applied automatically.
When generated via API, a time zone can be specified in the request body; otherwise, UTC is used by default.
Project Reports: Results Distribution
Project reports now include a Results Distribution section with tables showing vulnerability distribution by status and state. This provides clearer visibility into workflow classification and improves report completeness, readability, and governance reporting.
The structure also aligns with SAST on-premises reports, improving the user experience for customers migrating to Checkmarx One.
CxLink: Improved Kubernetes and Docker Setup Instructions
The CxLink UI now provides enhanced setup instructions for Kubernetes environments, including examples for creating a Kubernetes secret to store Link credentials and a pod definition for running the Link client image.
In addition, Docker setup instructions have been updated to support using an environment file instead of passing secrets directly via the command line.
CxLink: More Secure Docker Setup Instructions
The CxLink UI now provides updated Docker setup instructions that avoid passing secrets as command-line arguments. Instead, users create a local .env file to store sensitive values such as the Link token and tunnel name, and reference them when running the container.
Mandatory Comment When Changing a Result State
To improve traceability and auditability of changes, users are now required to provide a comment when changing the state of a result.
Policy Management: Public API to Assign Projects to Policies
Checkmarx One now provides a public Assign Project to Policy API for assigning projects to policies.
You can use this API in combination with existing endpoints to implement bulk assignment logic. For example:
Retrieve policies via the Retrieve all policies API.
Extract relevant tags associated with each policy.
Retrieve projects using the Retrieve list of projects API filtered by those tags.
Assign each project to the appropriate policy using the new Assign Project to Policy API
IAM: Tenant-Level IP Restrictions
Checkmarx One now supports IP allowlisting at the tenant level, enabling IAM Admins to restrict platform access to specific IP addresses or CIDR ranges.
Admins can configure up to 10 IPv4 entries in the IAM settings. During login, the user’s origin IP is validated before authentication. Access is granted only if the IP matches the allowlist. IAM Admins and service accounts are always allowed, ensuring uninterrupted administration and automation.
For more information, see Restricting IP Addresses
SCA
Delta Scan via CLI
Checkmarx One CLI scans now support Delta Scan resolution when running SCA scans via the CLI with SCA Resolver. Delta Scan now runs by default when rescanning an existing project, significantly reducing scan time. You can override this behavior by using the --sca-resolver-params flag with the --disable-delta-scan argument. This enhancement improves scan efficiency and accelerates feedback during repeated scans.
Requirements (minimum versions for this functionality):
CLI version 2.3.44 and above
SCA Resolver version 2.13.3 and above
SCA Results Viewer Alignment
Results from the SCA scanner are now presented using the same shared UI components and interaction patterns used by other scanners. The Packages, Risks and License views now support consistent navigation, filtering, searching, and drill-down views, aligning the SCA experience with other Checkmarx One results viewers.
This alignment improves usability and consistency across scanners, making it easier for users to analyze SCA findings alongside results from other Checkmarx One scanners.
New SCA Composite Risk Score – CxScore
Checkmarx One has introduced a new metric, CxScore, for SCA vulnerabilities. CxScore improves remediation prioritization by providing a composite score that better reflects the actual risk posed by a vulnerable package. The score is calculated using multiple risk factors, including CVSS 3.0 and 4.0 (when available), EPSS score, dependency type (direct or transitive), and the presence of an exploitable path.
CxScore is automatically calculated whenever scans complete or when relevant CVE data changes. The score is now available across SCA views, including Packages, Risks, Risk Details, and Global Inventory. The existing Risk Score (based solely on CVSS) remains available, and users can toggle between Risk Score and CxScore in relevant views. CxScore is also included in exported reports (JSON, XML, and CSV) and can be used in policy rules to define vulnerability thresholds.
By incorporating additional risk intelligence and contextual factors, CxScore provides a more holistic vulnerability prioritization model and improves visibility into application security risk across the organization.
IaC
IaC updates are documented in the IaC changelog.
DAST
Custom Scripts During Authentication
In addition to uploading your configuration files or setting up your authentication during environment setup, you can use your own custom scripts during authentication. This is especially useful for users who have authentication secrets that change dynamically.
‘Systemic’ Label for Vulnerabilities
Instances of vulnerabilities shown in the Results Table (Vulnerability View) are now labeled as Systemic when they are detected across multiple parts of the system during a scan. Previously, this view displayed the number of individual instances in which the vulnerability appeared.
This update groups systemic vulnerabilities by their Similarity ID rather than by node or URL, improving consistency across scans and reducing memory overhead.
This change will cause all instances of a systemic alert to appear as New in the first scan after the update, even if they had been identified in earlier scans. In subsequent scans, if the issue has not been resolved, these alerts will appear as Recurrent.
Resolved Issues
Item | Description |
|---|---|
AST-139206 | Downloading the contributors CSV file returned a 504 (Bad Gateway) error and an empty file. |
AST-138253 | “Over time” view type for a selected Application with Vulnerabilties in Analytics and Dashboard page resulted in a 504 Gateway Timeout error. |
AST-136466 | The Application Overview page entered a continuous 404 loop, affecting all applications. |
AST-136263 | Bulk state change operations through |
AST-136262 | The “Automatically Sync” toggle in Global Settings did not function as expected. |
AST-136224 | The SAST worker failed to retrieve scan information from the |
AST-136168 | The Analytics Executive Overview displayed inconsistent kLoC values when using the “All States” filter. |
AST-135913 | The importer process remained stuck in a running state indefinitely. |
AST-135440 | Filtering by scanner type in the Analytics Engineering Overview did not work. |
AST-135087 | Clone and fetch operations returned HTTP 429 (Too Many Requests) responses without a retry mechanism. |
AST-133909 | A specific project generated reports with no results despite recent scans containing SCA and SAST findings. |
AST-133554 | Tenant import queries ended with an error. |
AST-133340 | PR decoration results from the SAST scanner were inconsistent. |
AST-133246 | The ASPM panel was missing despite appropriate permissions being assigned. |
AST-133167 | Retrieving SCM settings from configuration failed, causing scan failures. |
AST-133112 | Customized scan reports did not correctly reflect excluded result states. |
AST-132753 | The Analytics dashboard was missing the “All Projects/Applications” filter. |
AST-130224 | SAML users were unassigned from all groups despite a valid group mapper and IdP attributes. |
AST-129488 | Reports per application were generated with incorrect data. |
AST-129205 | The Scans API did not validate license constraints when creating scans. |
AST-128159 | CxLink metadata treated private URLs with a trailing slash as different values. |
AST-126482 | All API keys were deleted when logging off active sessions. |
AST-125702 | The |
AST-124921 | The JWKS URL value in OIDC settings was overwritten with “false.” |
AST-123854 | Scans failed with a “Failed to run filesystem scan” error in 2MS. |
AST-123729 | A JDBC-based component generated an abnormal number of database calls from the IAM service. |
AST-116673 | Deleting a non-main branch scan removed fixed data from the project. |
AST-135077 | Existing SAML configurations lost the NameID Policy Format and Principal Type values. |
AST-123546 | The “User is idle” attribute ignored user activity and terminated active sessions. |
AST-134351 | The GET |
AST-136080 | Users with manage-clients permissions did not have access to the IAM UI. |
AST-132786 | Preset operations failed after import with a “failed to load system presets” error. |
AST-125058 | SCA scan reports did not display results when filtered by Status “New.” |
AST-137248 | Documentation for reports focusing on production branches was incomplete or unclear. |
AST-135881 | Token refresh operations failed due to insufficient timeout configuration. |
AST-134785 | Report generation failed with a “Failed getting SastResults From Stream” error. |
AST-130993 | Configuration templates generated warnings due to the deprecated |
AST-128248 | IAM Roles were not visible and returned a 404 error. |
AST-125608 | Adding rules from project settings for file or folder values did not work as expected. |
AST-120771 | SAST scans were marked as engine failed even though the scan completed successfully. |
SCA-26036 | Uploading the message body to the ShareRedisS3Bucket failed. |
SCA-26019 | CycloneDX SBOM exports did not include scan tags and project tag values. |
SCA-25247 | Delta scans executed even after adding Configuration Registries. |
SCA-25199 | SCA reports generated blank output for scans with no-risk results. |