Changelog
All notable changes to this add-on will be documented in this file.
The format is based on Keep a Changelog.
65 - 2026-04-14
Changed
- Dependency update.
- Maintenance changes.
- The scan rules now have new tags for the OWASP Top 10 2025, and API Top 10 2023.
- Depends on an updated version of the Common Library add-on.
- The Possible Username Enumeration scan rule now includes example alert functionality for documentation generation purposes (Issue 6119).
64 - 2025-12-15
Added
- The following scan rules were added, having been promoted from Alpha:
- NoSQL Injection - MongoDB
- NoSQL Injection - MongoDB (Time Based)
Changed
- Update minimum ZAP version to 2.17.0.
Removed
- The following scan rules were removed, having been promoted to Release:
- Exponential Entity Expansion (Billion Laughs Attack)
- HTTP Only Site
- HTTPS Content Available via HTTP
- ShellShock - CVE-2014-6271
63 - 2025-11-04
Added
- SYSTEMIC tag to selected rules.
Changed
- Depends on an updated version of the Common Library add-on.
- Reduced usage of error level logging.
62 - 2025-09-18
Added
- QA CICD policy tag to selected rules.
Changed
- Update alert references to latest locations to fix 404s and resolve redirections.
61 - 2025-09-10
Changed
- Add alert references to CORS Header scan rule alerts (Issue 7100).
60 - 2025-09-02
Changed
- Depends on an updated version of the Common Library add-on.
- Add help details about behavior of scan rules which leverage OAST (Issue 8682)
Fixed
- Error logs to always include stack trace.
Added
- Rules (as applicable) have been tagged in relation to HIPAA and PCI DSS.
- The 403 Bypass scan rule now has a CWE reference.
- The Shell Shock scan rule now has the TEST_TIMING alert tag.
59 - 2025-06-20
Changed
- The extension now has a user friendly name for use in the GUI.
- Depends on an updated version of the Common Library add-on.
Added
- All rules have been tagged of interest to Penetration Testers.
58 - 2025-03-04
Changed
- Replace usage of CWE-200 for the Insecure HTTP Method scan rule (Issue 8714).
- Include exception message of failed attacks in the Server Side Request Forgery scan rule.
Fixed
- Address potential/theoretical reDoS issue in the Insecure HTTP Method scan rule.
57 - 2025-01-15
Changed
- Update minimum ZAP version to 2.16.0.
- The following scan rules now use more specific CWE IDs:
- Proxy Disclosure (Issue 8713)
- Possible Username Enumeration (Issue 8715)
- Remove double dot in skipped message of scan rules that use the Active Scan OAST service.
Fixed
- Address exception when scanning a message without path with Possible Username Enumeration scan rule.
- The WSTG alert tags on the HTTP Only Site scan rule.
Added
- Standardized Scan Policy related alert tags on various rules.
56 - 2024-09-24
Changed
- Log exception details in Out of Band XSS scan rule.
- Maintenance changes.
- The Anti-CSRF Tokens Check scan rule now only considers GET requests at Low Threshold (Issue 7741).
Fixed
- Address time-based false positives in Remote Code Execution - Shell Shock scan rule (Issue 8516).
55 - 2024-09-02
Changed
- The following scan rules now include example alert functionality for documentation generation purposes (Issue 6119):
- Expression Language Injection
- Cookie Slack Detector
Fixed
- Potential false positives in the Source Code Disclosure - File Inclusion scan rule when responses are empty or the original message resulted in an error to start with (Issue 8517).
- A spacing/punctuation issue in the Cookie Slack Detector scan rule, whereby the Other Info field would not have a space after colons and before lists of cookie names.
54 - 2024-07-22
Changed
- Update minimum ZAP version to 2.15.0.
- Maintenance changes.
Fixed
- Fixed regex for Relative Path Confusion, which detected absolute URL as relative.
- Alert text for various rules has been updated to more consistently use periods and spaces in a uniform manner.
53 - 2024-03-28
Changed
- Change links to use HTTPS in other info of Insecure HTTP Method (Issue 8262).
52 - 2024-03-25
Changed
- Updated reference for scan rule: Possible Username Enumeration (Issue 8262)
- Cookie Slack Detector scan rule now has a more specific CWE.
- Possible Username Enumeration scan rule now includes CWE-204 as a reference link.
- The following scan rules now include example alert functionality for documentation generation purposes (Issue 6119):
- Relative Path Confusion
- Integer Overflow Error
Removed
- Removed HTTP only reference for scan rule: Integer Overflow Error (Issue 8262)
51 - 2024-02-16
Changed
- The following scan rules now include example alert functionality for documentation generation purposes (Issue 6119):
- Backup File Disclosure
- Httpoxy - Proxy Header Misuse
- Anti-CSRF Tokens Check
- HTTP Parameter Pollution
- Cross-Domain Misconfiguration
- Alerts from the HTTP Parameter Pollution scan rule are now raised with Low confidence.
- Updated reference for scan rules (Issue 8262):
- Session Fixation
- Cross-Domain Misconfiguration
- Add website alert links to the help page (Issue 8189).
50 - 2024-01-26
Changed
- References for the following scan rules were updated (Issue 8262):
- Exponential Entity Expansion (Billion Laughs Attack)
- Relative Path Confusion
- HTTPS Content Available via HTTP
- Remote Code Execution - Shell Shock
- The following scan rules now include example alert functionality for documentation generation purposes (Issue 6119):
- HTTPS Content Available via HTTP
- Remote Code Execution - Shell Shock (it now also uses Alert Refs (Issue 7100))
49 - 2024-01-16
Changed
- Update minimum ZAP version to 2.14.0.
- Update references for Expression Language Injection and HTTP Parameter Pollution (Issue 8262).
- The Source Code Disclosure - SVN scan rule includes example alert functionality for documentation generation purposes (Issue 6119).
Removed
- Help entry for the Spring Actuators scan rule (missed during previous removal/promotion).
48 - 2023-09-08
Added
- The HTTP Only Site scan rule now includes example alert functionality for documentation generation purposes (Issue 6119).
Changed
- Maintenance changes.
- Depend on newer version of Common Library add-on.
- Use vulnerability data directly from Common Library add-on.
Fixed
- The Source Code Disclosure - File Inclusion alerts now consistently leverage the description and solution from the associated vulnerability details.
47 - 2023-07-20
Added
- The Source Code Disclosure - File Inclusion now includes example alert functionality for documentation generation purposes (Issue 6119).
- The following scan rules were added, having been promoted from Alpha:
- Server Side Request Forgery
- Text4shell (CVE-2022-42889)
Changed
- Update minimum ZAP version to 2.13.0.
Removed
- The following scan rules were removed, having been promoted to Release:
- Log4Shell
- Spring Actuator Information Leak
- Spring4Shell
- Server Side Template Injection
- Server Side Template Injection (Blind)
- XPath Injection
46 - 2023-05-03
Changed
- Maintenance changes.
- The Insecure HTTP Method Scan rule now allows PUT/PATCH methods, if they return JSON or XML data in response (Issue 7772).
- The Source Code Disclosure - Git scan rule now includes example alert functionality for documentation generation purposes (Issue 6119).
45 - 2023-03-03
Changed
- Maintenance changes.
- The Log4Shell scan rule alerts now include Alert References and Tags.
- The Spring4Shell scan rule now includes a CVE Alert Tag and reference link.
Fixed
- Use same non-default port in the HTTP Only Site scan rule.
44 - 2022-12-13
Changed
- Use lower case HTTP field names for compatibility with HTTP/2.
Fixed
- Preserve the HTTP version in the scan rules:
- Backup File Disclosure
- Bypassing 403
- Cross-Domain Misconfiguration
- Relative Path Confusion
- Source Code Disclosure - Git
- Source Code Disclosure - SVN
- Possible Username Enumeration
43 - 2022-10-27
Changed
- Update minimum ZAP version to 2.12.0.
- Depend on
databaseadd-on. - Maintenance changes.
- Rely on Network add-on to obtain more information about socket timeouts.
Added
- The following scan rules were added, having been promoted to Beta:
- CORS
- Exponential Entity Expansion
- Forbidden Bypass
- Log4Shell
- Out-of-Band XSS
- Spring4Shell
- Spring Actuator
- Blind SSTI
- SSTI
Fixed
- NPE in Source Code Disclosure File Inclusion Scan Rule
Removed
- The following scan rules were removed, having been promoted to Release:
- .env Information Leak
- Cloud Metadata Attack
- GET for POST
- Heartbleed OpenSSL Vulnerability
- Hidden File Finder
- Padding Oracle
- Remote Code Execution - CVE-2012-1823
- Source Code Disclosure - CVE-2012-1823
- SQL Injection - Hypersonic (Time Based)
- SQL Injection - MsSQL (Time Based)
- SQL Injection - MySQL (Time Based)
- SQL Injection - Oracle (Time Based)
- SQL Injection - PostgreSQL (Time Based)
- SQL Injection - SQLite
- Trace.axd Information Leak
- User Agent Fuzzer
- XSLT Injection
- XXE
42 - 2022-09-22
Changed
- Maintenance changes.
- Improved description, solution, and references for the Integer Overflow scan rule.
- Added new Custom Payloads alert tag to the example alerts of the Hidden File Finder and User Agent scan rules.
Added
- New User Agent strings to the User Agent fuzz scan rule.
- Additional source control paths for the Hidden Files finder scan rule.
41 - 2022-06-08
Changed
- Maintenance changes.
- Adding more checks to Hidden File Finder scan rule.
- The Cloud Metadata scan rule will now be attempted with additional payloads (using DNS not just IPs), and supporting Alibaba.
Fixed
- False Positive in XSLT Injection where “Microsoft-Azure-Application-Gateway” can be returned in a 403 if the gateway detects an attack.
40 - 2022-03-15
Changed
- Hidden File Finder scan rule, content checking has been added for .svn/entries as well as detection for wc.db.
- Use Network add-on to detect/serve HttPoxy scan rule requests.
- Maintenance changes.
- The CSRF Token scan rule will now raise alerts as Medium risk (Issue 7021).
Fixed
- Adapted Cloud Metadata Attack scan rule to use Custom Pages and active scan analyzer to help reduce false positives in certain cases (Issue 7033).
- Generic Padding Oracle scan rule will no longer raise an alert for validation fields when the error response contains expected error patterns (Issue 6183).
- Hidden File Finder no longer follows redirects when sending requests for potential hidden files which should make it less false positive prone (Issue 7036).
39 - 2021-12-13
Changed
- Update minimum ZAP version to 2.11.1.
- Maintenance changes.
38 - 2021-12-06
Changed
- Dependency updates.
- XxeScanRule: Use Out-of-band payloads in addition to existing attacks.
Added
- OWASP Web Security Testing Guide v4.2 mappings where applicable.
37 - 2021-10-07
Added
- OWASP Top Ten 2021/2017 mappings.
Changed
- Now targeting ZAP 2.11.
- Maintenance changes.
- Use OAST Callbacks for the XXE Scan Rule.
- Backup File Disclosure Scan Rule: When checkout a parent folder for 404 behavior assume a minimum folder name length of four to further eliminate chance of collision on short folder names (Issue 5330).
36 - 2021-09-17
Removed
- Apache Range Header DoS (CVE-2011-3192) scan rule has been retired (Issue 6516)
35 - 2021-07-06
Fixed
- Correct dependency requirements.
34 - 2021-06-17
Changed
- Now using 2.10 logging infrastructure (Log4j 2.x).
- The .env file scan rule now performs even better checks to reduce false positives (Issue 6099, 6629).
- The trace.axd file scan rule now performs a content check to reduce false positives (Issue 6517).
- XML External Entity Attack scan rule changed to detect a possible XML File Reflection Attack when XML validation is present. (Issue 6204)
- Added/updated the details of some alerts (some changes might break Alert Filters)
- Backup File Disclosure
- The attack, evidence, and other info will use URIs in encoded form.
- Insecure HTTP Method
- The URI field will be in encoded form.
- Integer Overflow
- Added evidence
- Relative Path Confusion
- The attack and URI field will use URIs in encoded form.
- Source Code Disclosure - File Inclusion
- The URI field will be in encoded form.
- Source Code Disclosure - Git
- The URI field will be in encoded form.
- Source Code Disclosure - SVN
- The URI field will be in encoded form.
- SQL Injection - Hypersonic SQL
- The URI field will be in encoded form.
- SQL Injection - MySQL
- The URI field will be in encoded form.
- SQL Injection - Oracle
- The URI field will be in encoded form.
- SQL Injection - PostgreSQL
- The URI field will be in encoded form.
- SQL Injection - SQLite
- Evidence is now the string that was matched in the response
- The URI field will be in encoded form.
- XPath Injection
- Added evidence
- Backup File Disclosure
- The Source Code Disclosure - File Inclusion scan rule was modified to make use of the Dice algorithm for calculating the match percentage, thus improving its performance.
- Update links to repository.
- Maintenance changes.
Fixed
- Add missing file, used by Hidden File Finder scan rule.
- Correct Context check in scan rules:
- Session Fixation
- Possible Username Enumeration
33 - 2020-12-15
Changed
- Now targeting ZAP 2.10.
- The following scan rules now support Custom Page definitions:
- Hidden Files
- HTTPS as HTTP
- Insecure HTTP Methods
- Integer Overflow
- Padding Oracle
- Remove Code Execution CVE-2012-1823
- Session Fixation
- Source Code Disclosure CVE-2012-1823
- Source Code Disclosure Git
- Source Code Disclosure SVN
32 - 2020-11-26
Changed
- XML External Entity Attack scan rule changed to parse response body irrespective of the HTTP response status code. (Issue 6203)
- XML External Entity Attack scan rule changed to skip only Remote File Inclusion Attack when Callback extension is not available.
- Maintenance changes.
- The Relative Path Confusion scan rule no longer treats ‘href="#"’ as a problematic use.
Fixed
- Terminology.
- Correct reason shown when the XML External Entity Attack scan rule is skipped.
- SocketTimeoutException in the Proxy Disclosure scan rule.
Added
- The following scan rules were promoted to Beta: Cloud Meta Data, .env File, Hidden Files, XSLT Injection (Issue 6211).
Removed
- The following scan rules were removed and promoted to Release: ELMAH Information Leak, .htaccess Information Leak (Issue 6211).
31 - 2020-09-02
Changed
- ELMAH Information Leak ensure that test requests are appropriately rebuilt for this scan rule (Issue 6129).
- SQL rules changed to double check timing attacks
- Significantly reduced the number of attacks made by the SQLite rule
30 - 2020-07-23
Changed
- Anti-CSRF Tokens Check address potential false positives by only analyzing HTML responses (Issue 6089).
29 - 2020-07-22
Changed
- Maintenance Changes.
- Backup File Disclosure: don’t raise issues for non-success codes unless at LOW threshold (Issue 6059).
- ELMAH Information Leak: don’t raise issues unless content looks good unless at LOW threshold (Issue 6076).
- Session Fixation scan rule fix potential false positive on session cookie HttpOnly, and Secure flags (Issue 6082).
28 - 2020-06-01
Added
- Add info and repo URLs.
- Add links to the code in the help.
Changed
- Update minimum ZAP version to 2.9.0.
- Backup File Disclosure scan rule - updated CWE to 530, added reference links to alerts, made sure WASC and CWE identifiers are included in alerts.
- Maintenance changes.
- Updated owasp.org references (Issue 5962).
Fixed
- Use correct risk (
INFO) in User Agent Fuzzer, to run later in the scan.
27 - 2019-12-16
Added
- The following scan rules were promoted from Alpha to Beta:
- Apache Range Header DoS
- Cookie Slack Detector
- ELMAH Information Leak
- GET for POST
- .htaccess Information Leak
- HTTP Only Site
- Httpoxy - Proxy Header Misuse
- HTTPS Content Available via HTTP
- Proxy Disclosure
- Relative Path Confusion
- Source Code Disclosure - File Inclusion
- Source Code Disclosure - Git
- SQL Injection - MsSQL
- SQL Injection - SQLite
- Trace.axd Information Leak
- User Agent Fuzzer
Changed
- Add dependency on Custom Payloads add-on.
- Fixed ArrayIndexOutOfBoundsException issue in XML External Entity Attack scan rule.
- Now removes original XML header in “Local File Reflection Attack”.
- Maintenance changes.
- Update minimum ZAP version to 2.8.0.
- Elmah scan rule updated to include a response content check, and vary alert confidence values accordingly.
26 - 2019-07-11
- Fix FP in “Source Code Disclosure SVN” where the contents exactly matches, and only report issues with less evidence at a LOW threshold.
- Fix NPE in “Session Fixation” scan rule when the path of the request URI is null.
- Changed “Source Code Disclosure CVE20121823” to only analyze JS responses when a LOW alert threshold is used.
25 - 2019-06-07
- Correct HTTP message usage in Insecure HTTP Method scanner.
- Fix missing resource messages with Cross-Domain Misconfiguration scanner.
- Remove Source Code Disclosure WEB-INF Scanner (promoted to release Issue 4448).
- Report source code disclosure alerts at Medium instead of High
- Bundle Diff Utils library instead of relying on core.
24 - 2018-07-31
- Maintenance changes.
- Issue 1142: Logic and alert risk ratings modified.
- Correct timeout per attack strength in Heartbleed OpenSSL Vulnerability scanner.
- Issue 174: Added further method checks to the Insecure HTTP Methods Scanner.
- Skip “Source Code Disclosure - /WEB-INF folder” on Java 9+ (Issue 4038).
- BackupFileDisclosure - Handle empty “backup” responses.
23 - 2018-01-19
- At HIGH threshold only perform CSRF checks for inScope messages (Issue 1354).
22 - 2017-11-24
- Fix FP in “Source Code Disclosure - /WEB-INF folder” on successful responses (Issue 3048).
- Fix FP in “Integer Overflow Error” on 500 error responses (Issue 3064).
- Support security annotations for forms that dont need anti-CSRF tokens.
- Changed XXE rule to use new callback extension.
- Notify of messages sent during Heartbleed scanning (Issue 2425).
- Fix false positive in Code Disclosure - CVE-2012-1823 on image content (Issue 3846).
- Fix false positive in Backup File Disclosure scanner on 403 responses (Issue 3911).
- CsrfTokenScan : Keep session cookies instead of deleting all of them
21 - 2016-10-24
- Support changing the length of time used in timing attacks via config options.
- Support ignoring specified forms when checking for CSRF vulnerabilities.
- Do not attempt to parse empty cross domain policy files.
- Correct creation of attack URL in Source Code Disclosure - CVE-2012-1823.
- Correct creation of attack URL in Remote Code Execution - CVE-2012-1823.
- Respect OS techs included when scanning with Remote Code Execution - CVE-2012-1823.
- Adjust log levels of some scanners, from INFO to DEBUG.
20 - 2016-06-02
- Prevent XXE vulnerability.
- Issue 2174: Adjust logging, catch specific exceptions.
- Issue 2178: SQLInjectionMySQL - adjust logging, catch specific exceptions.
- Issue 2179: SQLInjectionPostgresql - adjust logging, catch specific exceptions.
- Issue 2272: SQLInjectionHypersonic - adjust logging, catch specific exceptions.
- Issue 2177: SourceCodeDisclosureSVN - adjust logging.
19 - 2016-02-05
- Adding Integer Overflow Scanner.
- Issue 823: i18n (internationalise) beta active scan rules.
- Issue 1713: Source Code Disclosure SVN Throws False Positive - Fixed.
- Add CWE and WASC IDs to active scanners which may have been lacking those details.
- Create help for scanners which were missing entries.
- Issue 2180: Adjust logging, and implement plugin skip if runtime requirements not met.
- Security fixes, to be detailed later.
18 - 2015-12-04
- Removing Format String.
- Fix unloading issue (Issue 1972).
- Slightly improve performance of “LDAP Injection” and “Username Enumeration”.
- Demoted LDAP rule due to performance issues
17 - 2015-09-07
- Moved Format String scanner from alpha to beta.
- Removing Buffer Overflow.
16 - 2015-08-24
- Minor code changes.
- Change scanners to honour the technologies enabled (Issue 1618).
- Added Buffer Overflow scanner to beta (Issue 1605).
15 - 2015-04-13
- Solved Comparison operator in XpathInjectionPlugin (Issue 1189).
- Promoted Backup File Disclosure to beta
- Promoted Cross Domain Scanner to beta
- Promoted HeartBleed to beta
- Promoted Insecure HTTP Method to beta
- Promoted Remote Code Execution - CVE2012-1823 to beta
- Promoted Shell shock to beta
- Promoted Source Code Disclosure - CVE2012-1823 to beta
- Promoted Source Code Disclosure - SVN to beta
- Promoted Source Code Disclosure - WEB-INF to beta
- Fixed minor regex escaping issue with Source Code Disclosure - SVN (Issue 1377)
- Updated for ZAP 2.4
14 - 2014-10-20
- Solved Comparison operator in XpathInjectionPlugin (Issue 1189).
- Promoted Backup File Disclosure to beta
- Promoted Cross Domain Scanner to beta
- Promoted HeartBleed to beta
- Promoted Insecure HTTP Method to beta
- Promoted Remote Code Execution - CVE2012-1823 to beta
- Promoted Shell shock to beta
- Promoted Source Code Disclosure - CVE2012-1823 to beta
- Promoted Source Code Disclosure - SVN to beta
- Promoted Source Code Disclosure - WEB-INF to beta
13 - 2014-04-10
- Promoted new XXE Plugin to test for remote and local XML External Entity Vulnerability.
- Promoted new PaddingOracle plugin to test for possible encryption padding errors.
- Promoted PXSS tests to beta.
- Promoted Command Injection release.
- Promoted new Expression Language Plugin to test JSP EL Injection.
- Changed help file structure to support internationalisation (Issue 981).
- Added content-type to help pages (Issue 1080).
- Updated add-on dir structure (Issue 1113).
12 - 2014-02-15
- Fixed a ClassNotFoundException while installing the add-on.
- Removed the scanner “Server Side Code Injection Plugin” (promoted to “Active scanner rules” add-on).
- Changed the “LDAP Injection” scanner to scan the parameters defined in the “Active Scan” options.
- Updated the “LDAP Injection” scanner to perform logic-based LDAP injection vulnerability detection
11 - 2013-10-14
- Corrected IDs to prevent clash
10 - 2013-09-27
- Fixed various errors logged
9 - 2013-09-11
- Updated to be compatible with 2.2.0
5 - 2013-06-18
- Fixed NullPointerExceptions when scanning with “Anti CSRF tokens scanner”
4 - 2013-05-13
- Fixed a MissingResourceException when scanning with “Anti CSRF tokens scanner”
3 - 2013-01-25
- Moved SQL Injection to release, tweaked SQL timing rules names
2 - 2013-01-17
- Updated to support new addon format