Skip to main content

Current Multi-Tenant Version | 3.53

New Features and Enhancements

Vulnerability Delta in Cloud Insights

GA: February 22, 2026

Cloud Insights now highlights changes in vulnerability counts between the image currently in production and the latest project scan. A new Image → Latest Scan column in the Cloud Insights Inventory clearly shows the delta, helping teams identify risk increases before code is deployed. You can filter projects by security trend and sort by total delta to quickly pinpoint areas where risk is rising. This makes it easier to assess the impact of upcoming releases, prioritize remediation efforts, and prevent vulnerable code from reaching production.

Custom Date Range Filter in Analytics

GA: February 22, 2026

Analytics now supports a custom date range filter, allowing you to select exact start and end dates using a classic date picker. The selected range is applied consistently across all KPIs, trend charts, and over-time metrics on the Analytics page.

This gives you full control over the timeframe you analyze, making it easier to create accurate reports, investigate specific periods, and base decisions on the most relevant data instead of fixed, predefined ranges.

To view a full explanation of Analytics filters, see Filtering.

AI-Powered Image Detection and Correlation in Cloud Insights

GA: February 22, 2026

Cloud Insights now leverages AI to enhance container image detection and correlation. The platform can identify third-party images, automatically extract commit hashes and source URLs, and correlate images to their originating projects.

For more information about Cloud Insights correlation methodology, see Correlation Methodology.

Webhook Creation Limits and Safeguards

GA: February 22, 2026

Webhook creation now includes built-in limits to improve platform stability and prevent accidental overload of internal services. Users can create only one webhook per Payload URL per level (Project or Tenant), with clear guidance to update an existing webhook if a duplicate is detected. The total number of webhooks a user can create is capped based on the number of supported event types, ensuring predictable and controlled usage.

When the same Payload URL exists at both Project and Tenant levels, the Project-level webhook takes precedence for matching events, while different event selections will trigger all relevant requests.

These safeguards make webhook usage more reliable and predictable, prevent misconfiguration and sprawl, and ensure integrations scale safely without impacting system performance.

Webhook Status Visibility on Scan Details

GA: February 22, 2026

Scan Details now show webhook execution status for each scan, making it clear whether associated webhooks were triggered successfully. When a scan completes, any related webhook activity is logged in the Scan Details side panel.

If a webhook fails, the log displays not only a Failed status but also a short error description explaining the reason. All existing scan conditions remain visible.

Monitor New Azure DevOps Repositories

GA: February 22, 2026

Checkmarx One now supports automatic monitoring of new Azure DevOps (ADO) repositories. When enabled, any new project created in a connected ADO organization is automatically imported into Checkmarx One, with default settings applied and a scan triggered right away.

For more information on this feature, see Monitor New Repositories.

Include Secret Detection and Repository Health in Analytics Dashboards

GA: February 22, 2026

Analytics dashboards now show metrics from the Secret Detection and Repository Health scanners.

You can now view findings and KPIs related to exposed secrets and repository health (OSSF) alongside existing analytics data from other scanners. This creates a unified analytics experience, giving you consistent visibility across all supported scan types.

Include Secret Detection and Repository Health in Reports

GA: February 22, 2026

Secret Detection and Repository Health scanners are now fully supported in both Scan and Project reports. These scanners can now be included in CSV scan reports as well as in Project reports across all supported formats (PDF and JSON), bringing them to full parity with existing scanners.

You can now select Secret Detection and Repository Health when generating reports, ensuring a consistent reporting experience across all scan types. This update provides a single, consolidated view of security findings and improves visibility across your organization’s security posture.

Container Security in Global Reports

GA: February 22, 2026

Global Reports now include Container Security results. When enabled, this scanner can be selected in the Global Report UI and is fully supported via API, with its findings included alongside existing scanners.

SCA

Support for Vulnerability Exploitability eXchange (VEX)

GA: February 22, 2026

You can now triage vulnerabilities in open-source dependencies using Vulnerability Exploitability eXchange (VEX) - a standardized, machine-readable format for communicating whether a known vulnerability (such as a CVE) actually affects your software.

This enhancement enables you to export SBOMs and reports that include clear, standardized exploitability classifications, helping teams reduce noise and focus on actionable risk.

Note

This capability complements existing triage workflows. All current triaging methods remain fully supported.

For more information about VEX triage, see Triaging SCA Results.

Filter Packages by Monitored State

GA: February 22, 2026

You can now explicitly filter packages by the Monitored state (excluding Muted and Snoozed packages).

The new filter is available in both the SCA Results → Packages tab and the SCA Global Inventory → Packages tab.

This enhancement reduces noise, streamlines triage workflows, and ensures consistent filtering behavior across all package views.

Identify Copyright Details for Open-Source Packages

GA: February 22, 2026

SCA now extracts copyright ownership information for open-source packages and includes it in reports, making it easier to track usage rights and meet compliance requirements. Copyright details are now included in exported SCA scan report and SBOMs. When multiple copyright statements are present, they are consolidated and clearly separated for readability.

This enhancement improves visibility, simplifies compliance workflows, and helps generate complete third-party notice files with minimal manual effort.

IaC

IaC updates are documented in the IaC changelog.

DAST

No new DAST-related features or enhancements are included in this release.

Resolved Issues

Item

Description

AST-131988

Triggering a manual scan failed with a null exception after the branch validation step.

AST-131459

Pull request decoration failed due to an illegal character in the input (%3Dfalse instead of =false), related to leftover triage comment deletion.

AST-128984

Muted results were displayed in the project popup and project overview.

AST-128186

The project conversion API did not accept a valid authentication token.

AST-126763

The Get Project API returned an incorrect response.

AST-124929

Project reports did not display the most recent scan when a new tag was applied.

AST-122322

DAST two-factor authentication failed when an incorrect secret key was provided.

AST-120579

The global scan component (“general”) showed an abnormally long execution duration exceeding several days.

AST-118999

Vulnerability remediation suggestions for base images (Postgres Alpine) were inconsistent.

AST-116032

Amazon-patched packages were incorrectly flagged as vulnerable in container scans.

AST-112523

Missing message queues were not recreated automatically after the containers service restarted.

AST-90832

Filtering the scan list by project name did not display all relevant projects.

SCA-25152

The SCA policy rules engine did not correctly evaluate the “Has a Remediation Recommendation” condition.

SCA-25077

The SAST UI did not reflect the latest updates in the build.gradle file.

SCA-25002

SCA file path viewing and download actions did not function as expected.

SCA-24757

File exclusion filter rules in CxOne did not apply correctly.

SCA-24661

SCA results processors waited excessively long for responses.

SCA-24306

The SCA packages processor experienced longer-than-expected processing times.

AST-131047

DAST vulnerabilities were not synchronized to Analytics.

AST-129908

The attack vector for SAST results was not highlighted.

AST-129279

SBOM-based SCA scans failed in a Single Tenant environment.

AST-128079

Downloading the contribution CSV file failed.

AST-127746

Schedule management was not visible in the UI even when the required feature flags were enabled.

AST-127264

Scans failed due to excessively long file names.

AST-126769

Wiz notifications for Azure repositories were not triggered correctly in Cloud Insights.

AST-125231

Project full names were not visible in the Project Migration UI.

AST-122133

A SQL sample caused incorrect lines-of-code (LOC) calculations.

AST-129351

The Query Editor failed to edit query metadata.

AST-128179

WebAudit scans became stuck with an “Error while reading EngineAgent output” message.

AST-127588

Preset names could not start with numeric characters.

AST-125707

Analytics results were incorrect when filtered by application.

AST-125679

The Analytics “Environments” filter did not work as expected.

AST-125613

The Checkmarx One SAST CSV report format lost backward compatibility.

AST-123684

Drill-down counters displayed incorrect values after multiple fixes on the same results.

AST-121577

The projectId parameter was unnecessarily required when creating application list reports.

AST-120284

A “Something Went Wrong” error appeared after scan history displayed scans from multiple branches.

AST-119877

Analytics displayed no data when filtering by a tag that existed only in older scans.

AST-116237

The “Vulnerabilities by State” analytics view opened an unfiltered table when selecting “Proposed Not Exploitable.”