Highlights
There’s always something going on, here are some of the bigger or notable improvements and additions from the last month:
Arbitrary Automation Framework Configuration Values
For a long time it has been possible to set various ZAP config options via the command line. This means that all of the configs are in one file. If telemetry is on then the ZAP team can figure out which options people are using and maybe add full support. It is now possible to set these directly inside your Automation Framework plan, either via the GUI, or manually editing the yaml. For example, if there was a need to set the number of passive scan threads:
configs:
pscans.threads: 8
Systemic Alerts
Building further from the previously announced Alert De-duplication changes. A set of changes have been implemented across the core, scan rules, and reports components. This means fewer duplicate Alerts, less noise, and more actionable results.
While not currently configured by default (in weeklies) the intent is that for Alerts which are tagged SYSTEMIC (such as passive scan results related to missing or incorrect headers) after a user configurable threshold (count) the Alerts Tree (in the GUI) will change the count to simply read “Systemic” and reports will include only limited examples.
Check for Updates Bug
Back in July we implemented a passive scan rule to raise Alerts when people are running out of date versions of ZAP.
In October a user pointed out that the rule was not adhering to ZAP’s -silent command line switch.
The issue has been addressed and we published a blog post about it.
Ongoing Work
- Authentication Improvements >
- Handle auth forms that do not respond to keyboard return input and that use non-standard password fields.
- The script credential parameter names were normalized and they are now always read as lower case for all types of credentials. This means that the credentials can be used the same way for all types of authentication methods. The old title case credentials are still supported but deprecated with a warning.
- Script errors during authentication are no longer reported as warnings in the Automation Framework for consistent behavior with all authentication methods, which handle authentication failures as errors. Users can leverage statistics checks to ensure that the authentication is being performed as expected.
- An issue was fixed that prevented the import of contexts that used an authentication script without additional parameters.
- Scan Rules > Address false positives in various rules.
- Documentation Improvements >
- Efforts continue to ensure all scan rules have example alerts for documentation generation purposes.
- We continue to document and update details with regard to using ZAP against various test apps.
New Contributors
A very warm welcome to the people who started to contribute to ZAP this month!
GitHub Pulse
Here are some statistics for the two main ZAP repositories:
zaproxy
Excluding merges, 5 authors have pushed 21 commits to main and 21 commits to all branches. On main, 54 files have changed and there have been 2,164 additions and 366 deletions.
zap-extensions
Excluding merges, 8 authors have pushed 92 commits to main and 92 commits to all branches. On main, 1,335 files have changed and there have been 15,961 additions and 12,178 deletions.
A total of 98 human PRs were merged on the ZAP repos.
Released Add-ons - Full Changelog
In October 2025, we released updated versions of 12 add-ons:
Active scanner rules (alpha)
v52
Added
- Suspicious Input Transformation Script Scan Rule.
Removed
- The two example active scan rules were removed from this add-on and are now part of: https://github.com/zaproxy/addon-java
Automation Framework
v0.54.0
Added
- Setting arbitrary config values
Changed
- Reinstate the validation of the Scan Policy in the
activeScanjob. - Adjust the text for the plan load warning/error dialog text to be clear which output panel it’s referring to.
- Maintenance changes.
- Depend on newer version of Common Library add-on.
Call Home
v0.16.0
Added
- Add statistics for the number of fatal/warn/error logged.
Common Library
v1.38.0
Added
- SYSTEMIC tag.
Changed
- Update dependencies.
v1.37.0
Added
- Support for alert reference overrides in script scan rule metadata.
GraalVM JavaScript
v0.10.0
Changed
- Update Graal JavaScript engine to version 25 (Issues 8477 and 9010).
- Use example links in Active/Passive Rule templates’ references.
- Update scan rule templates to use alertRefOverrides.
Linux WebDrivers
v164
Changed
- Update ChromeDriver to 142.0.7444.59.
v163
Changed
- Update ChromeDriver to 141.0.7390.122.
v162
Changed
- Update ChromeDriver to 141.0.7390.78.
v161
Changed
- Update ChromeDriver to 141.0.7390.76.
v160
Changed
- Update ChromeDriver to 141.0.7390.65.
v159
Changed
- Update ChromeDriver to 141.0.7390.54.
MacOS WebDrivers
v164
Changed
- Update ChromeDriver to 142.0.7444.59.
v163
Changed
- Update ChromeDriver to 141.0.7390.122.
v162
Changed
- Update ChromeDriver to 141.0.7390.78.
v161
Changed
- Update ChromeDriver to 141.0.7390.76.
v160
Changed
- Update ChromeDriver to 141.0.7390.65.
v159
Changed
- Update ChromeDriver to 141.0.7390.54.
Passive scanner rules
v68
Added
- SYSTEMIC tag to selected rules.
Changed
- Update dependency.
- The PII Disclosure scan rule now only evaluates visible text and script blocks in HTML responses at Medium or High alert threshold, while the entire response body is considered at Low alert threshold. To further prevent false positives at Medium or High alert threshold candidate strings with underscore are excluded.
- Depends on an updated version of the Common Library add-on.
Fixed
- ZAP is Out of Date rule to not trigger a CFU request in silent mode (Issue 9096).
Script Console
v45.14.0
Added
- Support for alert reference overrides in script scan rule metadata.
Changed
- Do not report authentication script errors as warnings in the Automation Framework for consistent behavior with all authentication methods, which handle errors as authentication failures.
Selenium
v15.41.0
Changed
- Update Selenium to version 4.37.0.
- Use configured Firefox binary when creating profiles.
Windows WebDrivers
v165
Changed
- Update ChromeDriver to 142.0.7444.59.
v164
Changed
- Update ChromeDriver to 141.0.7390.122.
v163
Changed
- Update ChromeDriver to 141.0.7390.78.
v162
Changed
- Update ChromeDriver to 141.0.7390.76.
v161
Changed
- Update ChromeDriver to 141.0.7390.65.
v160
Changed
- Update ChromeDriver to 141.0.7390.54.
Zest - Graphical Security Scripting Language
v48.10.0
Added
- Support for Edge in scripts run from the script console.
Changed
- Deprecate the
UsernameandPasswordcredential parameters in favor of the lowercaseusernameandpasswordvariants, aligning them with the naming convention of the other authentication credentials. - Update Zest library to 0.32.0.
Removed
- Support for Internet Explorer.