Skip to main content

Current Multi-Tenant Version | 3.51

New Features and Enhancements

AI Query Builder

The new AI Query Builder helps customers create and refine CxQL queries more quickly and intuitively by leveraging ChatGPT in the Queries Editor.

Use guided example prompts, on-demand regeneration, and easy code copying to customize queries with less effort and fewer errors - improving productivity and reducing time spent on manual query tuning.

Access to this feature is limited to users with Edit Query permissions.

For details, see our documentation.

Custom States for SCA and IaC Security Scanners

We now support custom states for risks identified by the SCA and IaC Security scanners.

For more information about custom states, see our Documentation Portal.

Note

This capability is available for new IAM customers only.

Application Type Classification for Improved Risk Focus

Applications can now be classified as Business or Internal, enabling more accurate risk prioritization.

Internal applications are excluded from meaningful risk impact, reducing noise, while Business applications continue to factor criticality into risk scoring.

This ensures that risk insights and top-risk views focus on applications that truly impact the business.

New Scan Status: Partial

A new Partial scan status has been added to scan history to better reflect scans that produced results but failed later in the process.

Their results remain available for review by downloading the scan log, providing clearer visibility and reducing confusion during scan analysis.

Accessibility Improvements: ADA Severity 1 Compliance

We’ve addressed Severity 1 accessibility issues identified during enterprise validation to improve compliance with ADA and WCAG 2.2 standards.

These fixes focus on critical areas such as keyboard navigation, focus order, and error identification, ensuring the platform is more accessible and usable for all users.

Ignore Images in Cloud Insights

You can now mark container images in the Cloud Insights inventory as Ignored to reduce noise from images that don’t require remediation.

From the inventory table, select one or more images and choose Ignore to hide them from the main view. Ignored images remain accessible through the Show Ignored Images filter, where you can review them and restore them to the inventory at any time.

This helps keep your inventory focused and actionable while preserving full control and visibility.

For more information, see documentation.

Protected Branch Wildcards for PR Scanning

You can now define protected branches using wildcard patterns for pull request scanning.

Instead of listing individual branch names, you can use flexible patterns (e.g., *, release*, *release) to automatically include matching branches.

This reduces manual configuration, improves coverage, and scales easily for repositories with dynamic or convention-based branching strategies.

SCA

New Automated Process to Add CVEs Quickly

In order to speed up the process of adding newly identified CVEs to our database, we have introduced a new automated process that identifies and publishes CVEs in a timely manner. However, this does not replace the need for our AppSec Research team to thoroughly analyze each CVE. Therefore, when the initial automated results are available, we publish the CVE with a note indicating that it is "pending manual review”. Once our AppSec team has completed their manual analysis they publish an updated version of the CVE details in which they correct any imprecise information and add important remarks about their analysis.

Highlighting AppSec Team Remarks

Our AppSec Research team often adds remarks based on their expert analysis. These remarks give important information about exploitability and remediation options. We now highlight these comments by showing them in a separate info box both in the scan results Risk Details page and in our AppSec Knowledge Center.

Additional Package Data in SCA Reports

We added new fields that provide additional information about the packages used in your project. This will help organizations meet regulatory requirements and improve the transparency and security of their software supply chain.

The Packages section of Checkmarx SCA reports now includes Component Description, Component Supplier and Executable Properties fields. And, SBOM reports (CycloneDX and SPDX) now include the Component Description field.

Added Suspected Malware Risks to AppSec Knowledge Center

You can now view Suspected Malware risk information in the AppSec Knowledge Center. It is presented similarly to vulnerabilities. This enables users to learn about specific risks without needing to scan a project with the risky package.

DAST

Proxy Support for DAST

Added proxy support for DAST, enabling you to scan internal, non‑public, or firewall‑protected applications from the cloud without whitelisting or exposing external IPs. This provides secure, temporary, on‑demand access for full dynamic testing while removing complex firewall configurations and accelerating security validation across cloud‑native and hybrid environments. For more information, see here.

CLI Commands for DAST Environment and Setup

You can now run your full DAST workflow directly from the CLI, removing the need for UI interaction or tunneling setups. A REST‑API‑driven script handles authentication, session creation, scanning, and results retrieval. For more information on the DAST CLI, see here.

IaC

Updated to version 2.1.18

Enhancements

The following new queries have been added:

  • Terraform/GCP

    • Ensures that critical contacts are configured for the organization

    • Ensures that legacy networks do not exist for older projects

  • Terraform/Azure

    • Checks that the use of user access administrator is not restricted

Bug fixes

  • Fixed an issue causing scans for large projects to get stuck.

  • Fixed an issue where the Aging summary was incorrect when new scans had the same results as older scans.

CLI and Plugins Releases of December 2025

CLI Version 2.3.42

General improvements and bug fixes.

CLI Version 2.3.41

General improvements and bug fixes.

CI/CD Plugins

In December we released the following CI/CD plugin versions:

  • GitHub Actions - 2.3.30 (uses CLI v2.3.41)

Improvements and Bug Fixes

Status

Item

Platform

Description

NEW

General

GitHub Actions

General improvements and bug fixes.

IDE Plugins

In December we released the following IDE plugin versions:

  • JetBrains - 2.3.0 (uses CLI v2.3.42)

  • Visual Studio - 4.4.11 (uses CLI v2.3.41)

  • VS Code - 2.44.0 (uses CLI v2.3.42)

Improvements and Bug Fixes

Status

Item

Platform

Description

NEW

Developer Assist

JetBrains

Added the following realtime scanners to Checkmarx One Developer Assist:

  • IaC

  • ASCA

The plugin now supports all realtime scanners available in Dev Assist.

NEW

Developer Assist

JetBrains

Added the following realtime scanners to Checkmarx One Developer Assist:

  • Containers

  • Secret Detection

NEW

Developer Assist

JetBrains

Checkmarx One Developer Assist: Provides real-time IDE security scanning and agentic AI remediation, leveraging Checkmarx’s MCP to generate context-aware fixes.

For more details, see Checkmarx Developer Assist.

Note

Currently, AI remediation is only supported for the Open Source Software (OSS) realtime scanner.

NEW

ASCA

JetBrains

Added ASCA, a lightweight source code scanner that enables developers to identify secure coding best practice violations as they code.

NEW

SCA Results Triage

VS Code

You can now triage SCA results — edit the state and add comments directly from the Visual Studio Code console. (Changing severity is not supported for SCA in VS Code.)

UPDATED

Kiro IDE

VS Code

The plugin was adapted to make it compatible also with Kiro IDE. Starting with this version the extension can also be used in Kiro.

Resolved Issues

Item

Description

AST-123316

Updating work items via the Jira REST API returned an error.

AST-121186

Editing result notes in SSCS did not allow space characters.

AST-121067

Container scans failed after running for 24 hours.

AST-120768

Generic API Key vulnerabilities were falsely detected in assembly names.

AST-120581

The UI did not display a visible error when updating code repository permissions.

AST-116060

Container scans timed out and the scan status did not update.

AST-114195

The Project Conversion API could not initiate the process for Azure projects, with partial results logged and missing failure reasons.

AST-112402

Bitbucket repository existence was not properly validated during SCM project conversion via API.

AST-111473

Container scans failed due to timeout during execution.

AST-124393

During Access Management Phase 1 migration, the group ID was assigned to projects instead of the group name.

SCA-24268

Global Inventory experienced instability issues.

AST-124980

DAST report generation failed when the statistics field was null.

AST-121714

The API endpoint GET /api/projects-overview returned null for projects without groups.

AST-121074

SAST failed to retrieve queries from the Query Service.

AST-121016

Group filtering on the Projects list page did not work for certain users.

AST-117303

Scans failed due to a timeout in the repository store service.

AST-116243

The KICS results handler returned HTTP 403 when changing state despite correct permissions.

AST-115556

Results were not forwarded to Wiz due to a comparison failure.

AST-1148

Pull request comments were not created in Bitbucket and no notification appeared in the “More Details” section.

AST-11393

Negative counters appeared in the Project Overview aging summary, originating from the KICS engine.

AST-110751

Project data required database intervention to be corrected.

AST-124040

Report generation was unavailable for DAST scans with zero results.

AST-122133

A SQL sample caused incorrect LOC counts.

SCA-24962

SCA scans failed due to an internal error in the sca-worker.

SCA-24872

Vulnerabilities in log4j-1.2.14.jar were not detected through binary recognition.

SCA-24680

License information was incorrect or missing in SCA results.

SCA-24292

The SCA risk aggregation symbol was inconsistent across the Results page.

SCA-24282

Binary packages were not detected in some SCA scans.