- Checkmarx Documentation
- Checkmarx One
- Release Notes
- Current Multi-Tenant Version | 3.51
Current Multi-Tenant Version | 3.51
New Features and Enhancements
AI Query Builder
The new AI Query Builder helps customers create and refine CxQL queries more quickly and intuitively by leveraging ChatGPT in the Queries Editor.
Use guided example prompts, on-demand regeneration, and easy code copying to customize queries with less effort and fewer errors - improving productivity and reducing time spent on manual query tuning.
Access to this feature is limited to users with Edit Query permissions.
For details, see our documentation.
Custom States for SCA and IaC Security Scanners
We now support custom states for risks identified by the SCA and IaC Security scanners.
For more information about custom states, see our Documentation Portal.
Note
This capability is available for new IAM customers only.
Application Type Classification for Improved Risk Focus
Applications can now be classified as Business or Internal, enabling more accurate risk prioritization.
Internal applications are excluded from meaningful risk impact, reducing noise, while Business applications continue to factor criticality into risk scoring.
This ensures that risk insights and top-risk views focus on applications that truly impact the business.
New Scan Status: Partial
A new Partial scan status has been added to scan history to better reflect scans that produced results but failed later in the process.
Their results remain available for review by downloading the scan log, providing clearer visibility and reducing confusion during scan analysis.
Accessibility Improvements: ADA Severity 1 Compliance
We’ve addressed Severity 1 accessibility issues identified during enterprise validation to improve compliance with ADA and WCAG 2.2 standards.
These fixes focus on critical areas such as keyboard navigation, focus order, and error identification, ensuring the platform is more accessible and usable for all users.
Ignore Images in Cloud Insights
You can now mark container images in the Cloud Insights inventory as Ignored to reduce noise from images that don’t require remediation.
From the inventory table, select one or more images and choose Ignore to hide them from the main view. Ignored images remain accessible through the Show Ignored Images filter, where you can review them and restore them to the inventory at any time.
This helps keep your inventory focused and actionable while preserving full control and visibility.
For more information, see documentation.
Protected Branch Wildcards for PR Scanning
You can now define protected branches using wildcard patterns for pull request scanning.
Instead of listing individual branch names, you can use flexible patterns (e.g., *, release*, *release) to automatically include matching branches.
This reduces manual configuration, improves coverage, and scales easily for repositories with dynamic or convention-based branching strategies.
SCA
New Automated Process to Add CVEs Quickly
In order to speed up the process of adding newly identified CVEs to our database, we have introduced a new automated process that identifies and publishes CVEs in a timely manner. However, this does not replace the need for our AppSec Research team to thoroughly analyze each CVE. Therefore, when the initial automated results are available, we publish the CVE with a note indicating that it is "pending manual review”. Once our AppSec team has completed their manual analysis they publish an updated version of the CVE details in which they correct any imprecise information and add important remarks about their analysis.
Highlighting AppSec Team Remarks
Our AppSec Research team often adds remarks based on their expert analysis. These remarks give important information about exploitability and remediation options. We now highlight these comments by showing them in a separate info box both in the scan results Risk Details page and in our AppSec Knowledge Center.
Additional Package Data in SCA Reports
We added new fields that provide additional information about the packages used in your project. This will help organizations meet regulatory requirements and improve the transparency and security of their software supply chain.
The Packages section of Checkmarx SCA reports now includes Component Description, Component Supplier and Executable Properties fields. And, SBOM reports (CycloneDX and SPDX) now include the Component Description field.
Added Suspected Malware Risks to AppSec Knowledge Center
You can now view Suspected Malware risk information in the AppSec Knowledge Center. It is presented similarly to vulnerabilities. This enables users to learn about specific risks without needing to scan a project with the risky package.
DAST
Proxy Support for DAST
Added proxy support for DAST, enabling you to scan internal, non‑public, or firewall‑protected applications from the cloud without whitelisting or exposing external IPs. This provides secure, temporary, on‑demand access for full dynamic testing while removing complex firewall configurations and accelerating security validation across cloud‑native and hybrid environments. For more information, see here.
CLI Commands for DAST Environment and Setup
You can now run your full DAST workflow directly from the CLI, removing the need for UI interaction or tunneling setups. A REST‑API‑driven script handles authentication, session creation, scanning, and results retrieval. For more information on the DAST CLI, see here.
IaC
Updated to version 2.1.18
Enhancements
The following new queries have been added:
Terraform/GCP
Ensures that critical contacts are configured for the organization
Ensures that legacy networks do not exist for older projects
Terraform/Azure
Checks that the use of user access administrator is not restricted
Bug fixes
Fixed an issue causing scans for large projects to get stuck.
Fixed an issue where the Aging summary was incorrect when new scans had the same results as older scans.
CLI and Plugins Releases of December 2025
CLI Version 2.3.42
General improvements and bug fixes.
CLI Version 2.3.41
General improvements and bug fixes.
CI/CD Plugins
In December we released the following CI/CD plugin versions:
GitHub Actions - 2.3.30 (uses CLI v2.3.41)
Improvements and Bug Fixes
Status | Item | Platform | Description |
|---|---|---|---|
NEW | General | GitHub Actions | General improvements and bug fixes. |
Plugin | Marketplace | Code Repository | Documentation | Changelog |
|---|---|---|---|---|
Azure DevOps | https://marketplace.visualstudio.com/items?itemName=checkmarx.checkmarx-ast-azure-plugin | |||
GitHub Action | https://github.com/marketplace/actions/checkmarx-ast-github-action | |||
TeamCity | https://github.com/CheckmarxDev/checkmarx-ast-teamcity-plugin | |||
Jenkins |
IDE Plugins
In December we released the following IDE plugin versions:
Improvements and Bug Fixes
Status | Item | Platform | Description |
|---|---|---|---|
NEW | Developer Assist | JetBrains | Added the following realtime scanners to Checkmarx One Developer Assist:
The plugin now supports all realtime scanners available in Dev Assist. |
NEW | Developer Assist | JetBrains | Added the following realtime scanners to Checkmarx One Developer Assist:
|
NEW | Developer Assist | JetBrains | Checkmarx One Developer Assist: Provides real-time IDE security scanning and agentic AI remediation, leveraging Checkmarx’s MCP to generate context-aware fixes. For more details, see Checkmarx Developer Assist. NoteCurrently, AI remediation is only supported for the Open Source Software (OSS) realtime scanner. |
NEW | ASCA | JetBrains | Added ASCA, a lightweight source code scanner that enables developers to identify secure coding best practice violations as they code. |
NEW | SCA Results Triage | VS Code | You can now triage SCA results — edit the state and add comments directly from the Visual Studio Code console. (Changing severity is not supported for SCA in VS Code.) |
UPDATED | Kiro IDE | VS Code | The plugin was adapted to make it compatible also with Kiro IDE. Starting with this version the extension can also be used in Kiro. |
Get Latest Version from Marketplace | Changelog | Documentation |
|---|---|---|
Resolved Issues
Item | Description |
|---|---|
AST-123316 | Updating work items via the Jira REST API returned an error. |
AST-121186 | Editing result notes in SSCS did not allow space characters. |
AST-121067 | Container scans failed after running for 24 hours. |
AST-120768 | Generic API Key vulnerabilities were falsely detected in assembly names. |
AST-120581 | The UI did not display a visible error when updating code repository permissions. |
AST-116060 | Container scans timed out and the scan status did not update. |
AST-114195 | The Project Conversion API could not initiate the process for Azure projects, with partial results logged and missing failure reasons. |
AST-112402 | Bitbucket repository existence was not properly validated during SCM project conversion via API. |
AST-111473 | Container scans failed due to timeout during execution. |
AST-124393 | During Access Management Phase 1 migration, the group ID was assigned to projects instead of the group name. |
SCA-24268 | Global Inventory experienced instability issues. |
AST-124980 | DAST report generation failed when the |
AST-121714 | The API endpoint |
AST-121074 | SAST failed to retrieve queries from the Query Service. |
AST-121016 | Group filtering on the Projects list page did not work for certain users. |
AST-117303 | Scans failed due to a timeout in the repository store service. |
AST-116243 | The KICS results handler returned HTTP 403 when changing state despite correct permissions. |
AST-115556 | Results were not forwarded to Wiz due to a comparison failure. |
AST-1148 | Pull request comments were not created in Bitbucket and no notification appeared in the “More Details” section. |
AST-11393 | Negative counters appeared in the Project Overview aging summary, originating from the KICS engine. |
AST-110751 | Project data required database intervention to be corrected. |
AST-124040 | Report generation was unavailable for DAST scans with zero results. |
AST-122133 | A SQL sample caused incorrect LOC counts. |
SCA-24962 | SCA scans failed due to an internal error in the |
SCA-24872 | Vulnerabilities in |
SCA-24680 | License information was incorrect or missing in SCA results. |
SCA-24292 | The SCA risk aggregation symbol was inconsistent across the Results page. |
SCA-24282 | Binary packages were not detected in some SCA scans. |