- Checkmarx Documentation
- Checkmarx One
- Release Notes
- Current Multi-Tenant Version | 3.53
Current Multi-Tenant Version | 3.53
New Features and Enhancements
Vulnerability Delta in Cloud Insights
GA: February 22, 2026
Cloud Insights now highlights changes in vulnerability counts between the image currently in production and the latest project scan. A new Image → Latest Scan column in the Cloud Insights Inventory clearly shows the delta, helping teams identify risk increases before code is deployed. You can filter projects by security trend and sort by total delta to quickly pinpoint areas where risk is rising. This makes it easier to assess the impact of upcoming releases, prioritize remediation efforts, and prevent vulnerable code from reaching production.
Custom Date Range Filter in Analytics
GA: February 22, 2026
Analytics now supports a custom date range filter, allowing you to select exact start and end dates using a classic date picker. The selected range is applied consistently across all KPIs, trend charts, and over-time metrics on the Analytics page.
This gives you full control over the timeframe you analyze, making it easier to create accurate reports, investigate specific periods, and base decisions on the most relevant data instead of fixed, predefined ranges.
To view a full explanation of Analytics filters, see Filtering.
AI-Powered Image Detection and Correlation in Cloud Insights
GA: February 22, 2026
Cloud Insights now leverages AI to enhance container image detection and correlation. The platform can identify third-party images, automatically extract commit hashes and source URLs, and correlate images to their originating projects.
For more information about Cloud Insights correlation methodology, see Correlation Methodology.
Webhook Creation Limits and Safeguards
GA: February 22, 2026
Webhook creation now includes built-in limits to improve platform stability and prevent accidental overload of internal services. Users can create only one webhook per Payload URL per level (Project or Tenant), with clear guidance to update an existing webhook if a duplicate is detected. The total number of webhooks a user can create is capped based on the number of supported event types, ensuring predictable and controlled usage.
When the same Payload URL exists at both Project and Tenant levels, the Project-level webhook takes precedence for matching events, while different event selections will trigger all relevant requests.
These safeguards make webhook usage more reliable and predictable, prevent misconfiguration and sprawl, and ensure integrations scale safely without impacting system performance.
Webhook Status Visibility on Scan Details
GA: February 22, 2026
Scan Details now show webhook execution status for each scan, making it clear whether associated webhooks were triggered successfully. When a scan completes, any related webhook activity is logged in the Scan Details side panel.
If a webhook fails, the log displays not only a Failed status but also a short error description explaining the reason. All existing scan conditions remain visible.
Monitor New Azure DevOps Repositories
GA: February 22, 2026
Checkmarx One now supports automatic monitoring of new Azure DevOps (ADO) repositories. When enabled, any new project created in a connected ADO organization is automatically imported into Checkmarx One, with default settings applied and a scan triggered right away.
For more information on this feature, see Monitor New Repositories.
Include Secret Detection and Repository Health in Analytics Dashboards
GA: February 22, 2026
Analytics dashboards now show metrics from the Secret Detection and Repository Health scanners.
You can now view findings and KPIs related to exposed secrets and repository health (OSSF) alongside existing analytics data from other scanners. This creates a unified analytics experience, giving you consistent visibility across all supported scan types.
Include Secret Detection and Repository Health in Reports
GA: February 22, 2026
Secret Detection and Repository Health scanners are now fully supported in both Scan and Project reports. These scanners can now be included in CSV scan reports as well as in Project reports across all supported formats (PDF and JSON), bringing them to full parity with existing scanners.
You can now select Secret Detection and Repository Health when generating reports, ensuring a consistent reporting experience across all scan types. This update provides a single, consolidated view of security findings and improves visibility across your organization’s security posture.
Container Security in Global Reports
GA: February 22, 2026
Global Reports now include Container Security results. When enabled, this scanner can be selected in the Global Report UI and is fully supported via API, with its findings included alongside existing scanners.
SCA
Support for Vulnerability Exploitability eXchange (VEX)
GA: February 22, 2026
You can now triage vulnerabilities in open-source dependencies using Vulnerability Exploitability eXchange (VEX) - a standardized, machine-readable format for communicating whether a known vulnerability (such as a CVE) actually affects your software.
This enhancement enables you to export SBOMs and reports that include clear, standardized exploitability classifications, helping teams reduce noise and focus on actionable risk.
Note
This capability complements existing triage workflows. All current triaging methods remain fully supported.
For more information about VEX triage, see Triaging SCA Results.
Filter Packages by Monitored State
GA: February 22, 2026
You can now explicitly filter packages by the Monitored state (excluding Muted and Snoozed packages).
The new filter is available in both the SCA Results → Packages tab and the SCA Global Inventory → Packages tab.
This enhancement reduces noise, streamlines triage workflows, and ensures consistent filtering behavior across all package views.
Identify Copyright Details for Open-Source Packages
GA: February 22, 2026
SCA now extracts copyright ownership information for open-source packages and includes it in reports, making it easier to track usage rights and meet compliance requirements. Copyright details are now included in exported SCA scan report and SBOMs. When multiple copyright statements are present, they are consolidated and clearly separated for readability.
This enhancement improves visibility, simplifies compliance workflows, and helps generate complete third-party notice files with minimal manual effort.
IaC
IaC updates are documented in the IaC changelog.
DAST
No new DAST-related features or enhancements are included in this release.
Resolved Issues
Item | Description |
|---|---|
AST-131988 | Triggering a manual scan failed with a null exception after the branch validation step. |
AST-131459 | Pull request decoration failed due to an illegal character in the input ( |
AST-128984 | Muted results were displayed in the project popup and project overview. |
AST-128186 | The project conversion API did not accept a valid authentication token. |
AST-126763 | The Get Project API returned an incorrect response. |
AST-124929 | Project reports did not display the most recent scan when a new tag was applied. |
AST-122322 | DAST two-factor authentication failed when an incorrect secret key was provided. |
AST-120579 | The global scan component (“general”) showed an abnormally long execution duration exceeding several days. |
AST-118999 | Vulnerability remediation suggestions for base images (Postgres Alpine) were inconsistent. |
AST-116032 | Amazon-patched packages were incorrectly flagged as vulnerable in container scans. |
AST-112523 | Missing message queues were not recreated automatically after the containers service restarted. |
AST-90832 | Filtering the scan list by project name did not display all relevant projects. |
SCA-25152 | The SCA policy rules engine did not correctly evaluate the “Has a Remediation Recommendation” condition. |
SCA-25077 | The SAST UI did not reflect the latest updates in the |
SCA-25002 | SCA file path viewing and download actions did not function as expected. |
SCA-24757 | File exclusion filter rules in CxOne did not apply correctly. |
SCA-24661 | SCA results processors waited excessively long for responses. |
SCA-24306 | The SCA packages processor experienced longer-than-expected processing times. |
AST-131047 | DAST vulnerabilities were not synchronized to Analytics. |
AST-129908 | The attack vector for SAST results was not highlighted. |
AST-129279 | SBOM-based SCA scans failed in a Single Tenant environment. |
AST-128079 | Downloading the contribution CSV file failed. |
AST-127746 | Schedule management was not visible in the UI even when the required feature flags were enabled. |
AST-127264 | Scans failed due to excessively long file names. |
AST-126769 | Wiz notifications for Azure repositories were not triggered correctly in Cloud Insights. |
AST-125231 | Project full names were not visible in the Project Migration UI. |
AST-122133 | A SQL sample caused incorrect lines-of-code (LOC) calculations. |
AST-129351 | The Query Editor failed to edit query metadata. |
AST-128179 | WebAudit scans became stuck with an “Error while reading EngineAgent output” message. |
AST-127588 | Preset names could not start with numeric characters. |
AST-125707 | Analytics results were incorrect when filtered by application. |
AST-125679 | The Analytics “Environments” filter did not work as expected. |
AST-125613 | The Checkmarx One SAST CSV report format lost backward compatibility. |
AST-123684 | Drill-down counters displayed incorrect values after multiple fixes on the same results. |
AST-121577 | The |
AST-120284 | A “Something Went Wrong” error appeared after scan history displayed scans from multiple branches. |
AST-119877 | Analytics displayed no data when filtering by a tag that existed only in older scans. |
AST-116237 | The “Vulnerabilities by State” analytics view opened an unfiltered table when selecting “Proposed Not Exploitable.” |