Changelog
All notable changes to this add-on will be documented in this file.
The format is based on Keep a Changelog.
81 - 2026-04-14
Changed
- Maintenance changes.
- The scan rules now have new tags for the OWASP Top 10 2025, and API Top 10 2023.
- Depends on an updated version of the Common Library add-on.
80 - 2026-03-02
Added
- Checks for cloud metadata from IBM and OpenStack.
- Evidence for cloud metadata.
Changed
- Update dependency.
Fixed
- Cloud metadata false positives by making the evidence checks more specific.
79 - 2025-12-30
Changed
- Update dependency.
Removed
- The following scan rule was removed, having been demoted to Alpha:
- SQL Injection - SQLite (Time Based)
78 - 2025-12-15
Added
- The following scan rules were added, having been promoted from beta:
- Exponential Entity Expansion (Billion Laughs Attack)
- HTTP Only Site
- HTTPS Content Available via HTTP
- ShellShock - CVE-2014-6271
Changed
- Update dependency.
- Update minimum ZAP version to 2.17.0.
77 - 2025-12-05
Fixed
- React2Shell multipart boundries.
76 - 2025-12-05
Added
- Remote Code Execution (React2Shell) Scan Rule (CVE-2025-55182, CVE-2025-66478)
Changed
- The External Redirect scan rule has been updated to account for potential false positives involving JavaScript comments.
75 - 2025-11-04
Added
- SYSTEMIC tag to selected rules.
Changed
- Address potential false positives with the XSLT Injection scan rule when payloads cause a failure which may still contain the expected evidence.
- Depends on an updated version of the Common Library add-on.
- Reduced usage of error level logging.
74 - 2025-09-18
Added
- QA CICD policy tag to selected rules.
Changed
- Update alert references to latest locations to fix 404s and resolve redirections.
- The SQL Injection - Oracle (Time Based) rule now uses DBMS_SESSION.SLEEP instead of an “expensive” query.
Fixed
- Hidden Files rule raising false positives if server returning 200 for files that don’t exist (Issue 8434).
73 - 2025-09-02
Changed
- Maintenance changes.
- Depends on an updated version of the Common Library add-on.
- The following scan rules and their alerts have been renamed to clarify that they’re time based (Issue 7341).
- SQL Injection - Oracle
- SQL Injection - MsSQL
- SQL Injection - MySQL
- SQL Injection - Hypersonic
- SQL Injection - SQLite
- SQL Injection - PostgreSQL
- The Remote OS Command Injection scan rule has been broken into two rules; one feedback based, and one time based (Issue 7341). This includes assigning the time based rule ID 90037.
- The External Redirect scan rule payload were slightly re-ordered to prioritize HTTPS variants.
- For Alerts raised by the SQL Injection scan rules the Attack field values are now simply the payload, not an assembled description.
- The Cross Site Scripting (Reflected) scan rule was updated to address potential false negatives when the injection context is a tag name and there is some filtering.
- The Path Traversal scan rule now includes further details when directory matches are made (Issue 8379).
- Add help details about behavior of scan rules which leverage OAST (Issue 8682).
Added
- Rules (as applicable) have been tagged in relation to HIPAA and PCI DSS.
- The Cloud Metadata Potentially Exposed scan rules now has a CWE reference.
- Scan rules which execute time based attacks now include the “TEST_TIMING” alert tag.
- The XPath Injection scan rule now supports error patterns provided via the Custom Payloads add-on (Issue 8958). A minimum of Custom Payloads 0.15.0 is required to take advantage of this optional functionality.
72 - 2025-06-20
Added
- Some Postgres error messages in the SQL Injection scan rule.
- All rules have been tagged of interest to Penetration Testers.
Changed
- SQL Injection scan rule to start using ComparableResponse - part of the work to reduce False Positives.
- Depends on an updated version of the Common Library add-on.
- Due to it being 2025 and the mass adoption of HTTPS: De-prioritized plain HTTP payloads in the External Redirect scan rule.
Fixed
- SQL Injection scan rule to treat a 500 response to an SQLi attack as a likely vulnerability.
- Use location header in SQL injection response comparisons (Issue 8651).
- Addressed False Negative with simple allow list handling in the External Redirect scan rule.
71 - 2025-03-04
Fixed
- External Redirect scan rule to regenerate anti CSRF tokens.
70 - 2025-01-09
Changed
- Update minimum ZAP version to 2.16.0.
- Updated help with specific Category identifiers for use with the Custom Payloads add-on for rules:
- Hidden File Finder
- User Agent Fuzzer
- Now depends on minimum Common Library version 1.29.0.
- Add the
OUT_OF_BANDalert tag to the following scan rules:- Server Side Template Injection (Blind)
- XML External Entity Attack
- Cloud Metadata Attack scan rule is improved to support GCP, Azure, and OCI.
- Remove double dot in skipped message of a scan rule that uses the Active Scan OAST service.
Fixed
- A situation where the Server-Side Template Injection (SSTI) scan rule might result in false positives related to the Go payloads (Issue 8622).
- False Positives in Cloud Metadata Attack scan rule (Issue 8514).
Added
- Standardized Scan Policy related alert tags on the rule.
69 - 2024-10-23
Changed
- The XML External Entity Attack scan rule now include example alert functionality for documentation generation purposes (Issue 6119).
Fixed
- Added more checks for valid .htaccess files to reduce false positives (Issue 7632).
68 - 2024-09-24
Changed
- Maintenance changes.
- The following scan rules now include example alert functionality for documentation generation purposes (Issue 6119):
- Spring Actuator
- XSLT Injection
- XPath Injection
Fixed
- Address false positives with Source Code Disclosure - CVE-2012-1823 scan rule, by not scanning binary responses and responses that already contain PHP source (Issue 8638).
- Cross Site Scripting Rule false positives at medium threshold by matching the expected context (Issue 8640).
67 - 2024-07-22
Changed
- The following rules now includes example alert functionality for documentation generation purposes (Issue 6119), as well as now including Alert Tags (OWASP Top 10, WSTG, and updated CWE):
- Server Side Template Injection
- Server Side Template Injection (Blind)
Fixed
- False positives in the Path Traversal rule.
- Alert text for various rules has been updated to more consistently use periods and spaces in a uniform manner.
- False Positives in the Remote File Inclusion rule (Issue 8561).
66 - 2024-05-07
Changed
- Update minimum ZAP version to 2.15.0.
65 - 2024-03-28
Changed
- Change link to use HTTPS in other info of SQL Injection - SQLite (Issue 8262).
64 - 2024-03-25
Changed
- The following scan rules now include example alert functionality for documentation generation purposes (Issue 6119):
- Source Code Disclosure - CVE-2012-1823
- Remote Code Execution - CVE-2012-1823
- Server Side Include
- Cross Site Scripting (Reflected)
- The Alerts from the Remote Code Execution - CVE-2012-1823 scan rule no longer have evidence duplicated in the Other Info field.
- The GET for POST scan rule now uses a different comparison mechanism which should be more tolerant of unrelated response differences.
63 - 2024-02-12
Changed
- Maintenance changes.
Added
- The SQL Injection scan rule now includes a MySQL/MariaDB generic error message.
62 - 2024-01-26
Changed
- The Source Code Disclosure - /WEB-INF Folder rule now includes example alert functionality for documentation generation purposes (Issue 6119).
61 - 2024-01-24
Changed
- Update reference for Server Side Include (Issue 8262)
Fixed
- False positives on redirects for:
- Cloud Metadata (Issue 7710)
- Hidden Files
60 - 2024-01-16
Changed
- Leave data empty instead of adding “N/A” for the scan rules:
- Cross Site Scripting (Persistent) - Prime
- Cross Site Scripting (Persistent) - Spider
- Update reference for Server Side Code Injection (Issue 8262).
- Now depends on minimum Common Library version 1.21.0.
Fixed
- Threshold handling in the Hidden File Finder scan rule.
- Improved the following scan rules by using time-based linear regression tests:
- Server Side Template Injection (Blind)
- SQL Injection - Hypersonic SQL
- SQL Injection - MsSQL
- SQL Injection - MySQL
Added
- Help entry for the Spring Actuators scan rule (missed during previous promotion).
- Website alert links to the help page (Issue 8189).
- The following scan rules now include example alert functionality for documentation generation purposes (Issue 6119) and in some cases updated references (Issue 8262).
- CRLF Injection
- Remote OS Command Injection
- GET for POST
- ELMAH Information Leak
- .env Information Leak
- .htaccess Information Leak
- Trace.axd Information Leak
59 - 2023-12-07
Added
- Support for mutations in reflected XSS rule.
Changed
- Depend on newer version of Common Library add-on.
Fixed
- Use high and low delays for linear regression time-based tests to fix false positives from delays that were smaller than normal variance in application response times, which affected Command Injection scan rule.
- Improved SQL Injection - PostgreSQL (Time Based) scan rule by using time-based linear regression tests.
- Catch correct context while analysing attributes instead of the last attribute where eyecatcher was reflected.
58 - 2023-10-12
Changed
- Update minimum ZAP version to 2.14.0.
57 - 2023-09-08
Changed
- Maintenance changes.
- Depend on newer version of Common Library add-on.
- Use vulnerability data directly from Common Library add-on.
Fixed
- False positive where linear regression time-based tests returned true when there were not enough requests for a statistically meaningful measurement.
56 - 2023-07-11
Added
- The Format String Error scan rule now includes example alert functionality for documentation generation purposes (Issue 6119).
- Corrected Hidden File Finder scan rule Blazor WASM config file path.
- The following scan rules were added, having been promoted from Beta:
- Log4Shell
- Spring Actuator Information Leak
- Spring4Shell
- Server Side Template Injection
- Server Side Template Injection (Blind)
- XPath Injection
Changed
- Update minimum ZAP version to 2.13.0.
55 - 2023-06-06
Changed
- The Parameter Tamper Scan rule now includes example alert functionality for documentation generation purposes (Issue 6119)
Fixed
- Fix typo in ASP payload of Server Side Code Injection scan rule.
- Include complete solution of Server Side Include scan rule.
- Ensure Custom Payloads support can be properly unloaded.
Added
- The Hidden File Finder scan rule now check for Blazor WASM config files.
54 - 2023-05-03
Changed
- Maintenance changes.
Fixed
- Correct IP used for AWS/GCP in the Cloud Metadata Potentially Exposed scan rule (Issue 7829).
53 - 2023-03-03
Changed
- Maintenance changes.
- The SQL Injection Scan Rule filters reflected payload containing escaped characters like ‘&’ and ‘"’ before response content comparison to reduce false negatives.
52 - 2023-02-03
Changed
- The following scan rules now include example alert functionality for documentation generation purposes (Issue 6119 & 7100).
- Buffer Overflow
- Cloud Metadata
- Code Injection
- Path Traversal
- Remote File Include
- The Path Traversal scan rule no longer populates the Other Info field with check information, as the Alert Reference now provides that detail.
- Maintenance changes.
- Update dependency.
- CVE-2012-1823 Remote Execution and Source Code Disclosure, and Heart Bleed scan rules now include Alert Tags for the applicable CVEs.
Fixed
- A false positive that could occur in the External Redirect scan rule if the payload was included in the redirect as a param or portion of the value.
51 - 2023-01-03
Changed
- Command Injection Scan Rule: Time-based blind detection heuristic has been replaced with linear regression.
Fixed
- SQL rule should not target NoSQL Dbs.
Changed
- Maintenance changes.
50 - 2022-12-13
Changed
- The Directory Browsing scan rule now includes example alert functionality for documentation generation purposes (Issue 6119).
- Use lower case HTTP field names for compatibility with HTTP/2.
- Maintenance changes.
Fixed
- False positive in case of javascript: protocol xss attacks, when attack payload is modified by the application (Issue 6013).
- Preserve the HTTP version in the scan rules:
- Remote Code Execution - CVE-2012-1823
- Source Code Disclosure - CVE-2012-1823
- Source Code Disclosure - /WEB-INF folder
Added
- The Hidden File Finder scan rule will now also check for “/_wpeprivate/config.json”.
49 - 2022-10-27
Added
- The following scan rules were added, having been promoted from Beta:
- .env Information Leak
- Cloud Metadata Attack
- GET for POST
- Heartbleed OpenSSL Vulnerability
- Hidden File Finder
- Padding Oracle
- Remote Code Execution - CVE-2012-1823
- Source Code Disclosure - CVE-2012-1823
- SQL Injection - Hypersonic (Time Based)
- SQL Injection - MsSQL (Time Based)
- SQL Injection - MySQL (Time Based)
- SQL Injection - Oracle (Time Based)
- SQL Injection - PostgreSQL (Time Based)
- SQL Injection - SQLite
- Trace.axd Information Leak
- User Agent Fuzzer
- XSLT Injection
- XXE
Changed
- Update minimum ZAP version to 2.12.0.
- Maintenance changes.
- Rely on Network add-on to obtain more information about socket timeouts.
48 - 2022-09-22
Changed
- Command Injection Scan Rule: Decode HTML entities in HTML responses before attempting to search for attack validation patterns.
47 - 2022-08-16
Added
- Cross Site Scripting header splitting attacks.
- The External Redirect scan rule now includes alert references on Alerts, and has example alert functionality for documentation generation purposes.
Changed
- Maintenance changes.
- Updated the External Redirect scan rule to be more accurate.
- The Reflected XSS scan rule now generates alerts for all content-types when alert threshold set to LOW. If alert threshold MEDIUM or HIGH, alerts are raised for HTML responses only.
Fixed
- The Remote File Inclusion scan rule no longer follows redirects before checking the response for content indicating a vulnerability (Issue 5887).
- False positive where Cross Site Scripting payloads are safely rendered in a textarea tag.
- Unescaped tag end causing Cross Site Scripting rule to throw an exception.
46 - 2022-03-21
Changed
- Maintenance changes.
Fixed
- Fix Cross Site Scripting (Reflected) scan rule false negatives introduced in previous version.
45 - 2022-03-15
Changed
- Remote OS Command Injection rule now has more information in the Other Info field to differentiate feedback-based or time-based tests
- Path Traversal scan rule, updated the regex for case 5 to be case-insensitive when searching for Error or Exception in content body.
- Maintenance changes.
Fixed
- Server Side Code Injection scan rule, prevent use of zero when injecting ASP multiplication to avoid false positives (Issue 7107).
- External Redirect scan rule to detect redirects with dots deny listed.
- Cross Site Scripting (Reflected) scan rule will no longer raise an alert for unsuccessful JavaScript string injections (Issue 1641).
44 - 2022-01-13
Changed
- Update minimum ZAP version to 2.11.1.
- The XSS scan rule will try several different payloads if the payload is being reflected outside of any HTML tags (for example in a JSON response body).
43 - 2021-12-06
Added
- OWASP Web Security Testing Guide v4.2 mappings where applicable.
42 - 2021-11-29
Changed
- Command Injection scan rule will now initially attempt a simple injection without the original parameter value (Issue 6538).
- Reflected XSS rule: added a generic ‘onerror’ attack and tweaked the case of the script attack
41 - 2021-10-06
Changed
- Added OWASP Top Ten 2021/2017 mappings.
- Update minimum ZAP version to 2.11.0.
40 - 2021-06-17
Changed
- The SQL Injection scan rule will raise alerts with the URI field in encoded form.
- Update links to repository.
Fixed
- Correct Context check in SQL Injection scan rule.
- “Source Code Disclosure - /WEB-INF folder” is no longer skipped on Java 9+ (Issue 4038).
- Fix ascan rules not enforcing MaxRuleDuration when getting IOExceptions (Issue 6647).
39 - 2021-05-10
Changed
- Now using 2.10 logging infrastructure (Log4j 2.x).
- Maintenance changes.
- The Path Traversal scan rule should now be less False Positive prone at High Threshold, one of it’s checks will now be excluded at High Threshold (Issues: 4209, 6030, 6219, 6372, and 6380).
- The Other info field of Alerts will now include a reference indicating which check the triggered alert is caused by, in order to assist in future user inquiries.
- Added/updated the details of some alerts (some changes might break Alert Filters)
- Buffer Overflow
- Includes an Attack string
- Evidence changed from the whole request header to the specific string sought
- Code Injection
- Includes evidence for PHP and ASP related alerts
- CRLF Injection
- Attack and Evidence are now more specific
- Directory Browsing
- Attack is now the URL of the request
- Evidence added
- Buffer Overflow
- Parameter Tampering scan rule, adjusted regular expression related to VBScript errors.
- Code Injection scan rule is now using random numbers for the ASP related check.
- SQL Injection scan rule now has one more payload for error based checks, and an additional SQLite related check string (Issue 6588).
Fixed
- Fix XSS false positive (Issue 5958).
38 - 2020-12-15
Changed
- Now targeting ZAP 2.10.
- The following scan rules now support Custom Page definitions:
- Buffer Overflow
- Directory Browsing
- Format String
- Parameter Tamper
- Path Traversal
- Remote File Include
- Source Code Disclosure WEB-INF
37 - 2020-11-26
Changed
- Maintenance changes.
Fixed
- Terminology
Added
- The following scan rules were promoted to Beta: ELMAH Information Leak, .htaccess Information Leak (Issue 6211).
36 - 2020-08-04
Changed
- Maintenance changes.
35 - 2020-06-01
Changed
- Update minimum ZAP version to 2.9.0.
- Command Injection, Test Path Traversal, Test Cross Site ScriptV2 and Remote File Include rules are updated to include payloads for Null Byte Injection (Issue 3877).
- Updated owasp.org references (Issue 5962).
Fixed
- Fix typo in the help page.
- Use correct risk (
HIGH) in External Redirect, to run earlier in the scan. - Correct tech check in SQL Injection scan rule, which could cause it to be skipped with imported contexts (Issue 5918).
34 - 2020-01-17
Added
- Add info and repo URLs.
- Add links to the code in the help.
Changed
- Improved PowerShell injection control patterns to reduce false positives.
- Maintenance changes.
- Issue 5271: Fix SQLi false positive (and potential false negative) when response bodies contain injection strings.
33 - 2019-06-07
- Maintenance changes.
- Promote Source Code Disclosure WEB-INF (Issue 4448).
- Bundle Diff Utils library instead of relying on core.
32 - 2018-10-04
- Maintenance changes.
- Persistent XSS scanner updated to address various false negatives (Issue 4692).
- Command Injection plugin updated to include payloads for Uninitialized environment variable WAF bypass (Issue 4968).
- Correct Remote OS Command Injection to use the expected time in all time based payloads.
31 - 2018-03-05
- Issue 1852: Fix reflected XSS false negative with poor quality HTML filtering.
- Issue 1640: Fix reflected XSS false negative with double decoded output.
- Issue 2290: Fix SQLi false negative with ODBC error message.
30 - 2018-02-06
- Issue 1366: Allow SSI detection patterns to include new lines, and pre-check the original response for detection patterns to reduce false positives.
- Issue 4168 and 4230: Pre-check the original response for detection patterns.
29 - 2018-01-19
- Issue 3979: Fix reflected XSS in PUT response.
- Issue 3978: Handle reflected XSS in JSON response.
- Issue 4211: Fix false positive in FormatString scanner.
28 - 2017-11-27
- Updated for 2.7.0.
27 - 2017-11-24
- Issue 1365: Additional Path Traversal detection.
- Correct alert’s evidence/attack of Parameter Tampering (Issue 3524).
- Fix Path Traversal false positives when
etcis a substring (Issue 3735). - Code changes for Java 9 (Issue 2602).
- TestSQLInjection Modifications to improve handling of injected math expressions and reflected params (Issue 3139).
26 - 2017-04-06
- Issue 2973: Drop suffix on *Nix Blind Command Injection time based variants to maximize compatibility.
- Improve error handling in some scanners.
- Support changing the length of time used in timing attacks via config options.
- Issue 3065: Ensure active scanners perform initial status checks against the proper original message(s) to prevent False Negative and False Positive conditions.
25 - 2016-09-28
- Issue 1211 - SQLi Scanner may raise seemingly duplicate alerts (fixed).
- Use correct HTTP message and attack for alerts of “Format String Error”.
- Fixed test for wrong tag in Reflected XSS rule.
- Issue 1632 - False Negative XSS on injection outside of HTML tags.
24 - 2016-07-15
- TestPathTraversal - catch InvalidRedirectLocationException and URIException.
- TestRemoteFileInclude - adjust logging (debug not error).
- Run SQL Injection if any DB tech is enabled but skip specific non-applicable error checks.
- Issue 2624: Improve Error Logging in PathTraversal Plugin.
23 - 2016-06-02
- Issue 823 - i18n (internationalise) release active scan rules.
- Issue 2001 - Add PowerShell variants to CommandInjection Plugin.
- Add CWE and WASC IDs to active scanners which may have been lacking those details.
- Add missing skip/stop checks to some scanners (Issue 1734).
- Remote File Include FP if original title includes ‘Google’ (Issue 2240).
- Issue 2264: TestPathTraversal - adjust logging, catch specific exceptions.
- Issue 2265: TestRemoteFileInclude - adjust logging, catch specific exceptions.
- Issue 2266: TestCrossSiteScriptV2 - adjust logging, catch specific exceptions.
- Issue 2267 & 1860: TestSQLInjection - adjust logging, catch specific exceptions.
- Issue 2268: CodeInjectionPlugin - adjust logging, catch specific exceptions.
- Issue 2269: BufferOverflow - adjust logging, catch specific exceptions.
- Issue 2270: FormatString - adjust logging, catch specific exceptions.
- Issue 2271: TestParameterTamper - adjust logging, catch specific exceptions.
- Issue 1550: CommandInjectionPlugin - adjust logging, catch specific exceptions.
21 - 2015-11-19
- Change Path Traversal scanner to also check HTML responses in decoded form.
- Move Format String from Beta to Release.
- Improve memory usage when scanning for persistent XSS vulnerabilities (Issue 1974).
- Fix False Positives in Buffer Overflow.
- Fixed False Positives in Format String.
- Fixed incorrect i18n string being used which caused the External Redirects code to fail.
20 - 2015-09-07
- Added Buffer Overflow scanner.
19 - 2015-08-24
- Issue 1146: variable ‘param’ is used instead of ‘value’? in TestCrossSiteScriptV2.
- Handle cases where the response is the full XSS payload.
18 - 2015-07-30
- Improved “Path Traversal” scanner.
- Change scanners to honour the technologies enabled.
17 - 2015-04-13
- Changes to TestInjectionCRLF: address FindBugs issue, remove forced HTML elements in
- references, add proper WASC ID.
- Added blind command injection checks for CommandInjectionPlugin.
- Upgraded to ZAP 2.4.
- Issue 823: i18n active/passive scan rules.
- Issue 1529: TestExternalRedirect minor performance improvement, injection generation changed to reduce collisions or false positives.
- Issue 1569: TestExternalRedirect plugin ID changed from 30000 to 20019.
- Issue 1499: Replace active ‘Client Browser Cache’ with passive ‘Cache Control’ rule. TestClientBrowserCache removed.
- Issue 1592: CommandInjectionPlugin timing false positives
16 - 2014-07-22
- Fixed bug in Persistent XSS rule (Issue 1273)
15 - 2014-05-20
- Tweaked the SQLi rule to maximize vuln detection and minimize fps (Issue 1195)
- Fixed XSS false positive in non URL tag attributes (Issue 964)
14 - 2014-04-10
- Fix for TestRemoteFileInclude failing if Google return localized page.
- Moved PXXS tests from beta.
- Moved Command Injection from beta.
- Reviewed and enforced the External Redirect plugin.
- Removed duplicated TestRedirect plugin (it was a subset of the TestExternalRedirect one)
- Changed help file structure to support internationalisation (Issue 981).
- Added content-type to help pages (Issue 1080).
- Updated add-on dir structure (Issue 1113).
13 - 2013-12-11
- Fix for TestRemoteFileInclude failing if Google return localized page
12 - 2013-09-27
- Fixed various errors logged
11 - 2013-09-11
- Updated to be compatible with 2.2.0
9 - 2013-07-20
- Improved the “SQL Injection” scanner with detection of parameters used in the “ORDER BY” clause of the SQL select statement;
- Changed the “Session ID in URL rewrite” scanner to allow the characters “-” and “!” in “JSESSIONID” session token value.
8 - 2013-06-24
- Updated language files.
7 - 2013-05-27
- Updated language files.
6 - 2013-04-18
- Updated for ZAP 2.1.0
5 - 2013-03-18
- Modified the generic SQL Injection scanner to detect “.NET Framework Data Provider for OLE DB.” error message fragments,
- added an error fragment for generic JDBC error messages,
- fixed an encoding issue with special argument values,
- and try both replacing and appending the parameter value when attempting to force SQL error messages.
4 - 2013-01-25
- Split out Remote File Inclusions to separate rule, moved SQL Injection from beta, added ‘Reflected’ to XSS test name
3 - 2013-01-17
- Updated to support new addon format