🚀 Just released: Latio 2026 Application Security Market Report. Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
  • SAST
    Early static security analysis
  • Open Source (SCA)
    Find vulnerable dependencies
  • SBOM & License Risk
    Generate SBOMs and track licenses
  • Secrets
    Detect exposed secrets in applications
  • Infrastructure as Code
    Ingest IaC security findings
  • Container
    Track container image vulnerabilities
Test Runtime
Test live applications like attackers
  • DAST & AI DAST
    Test runtime, prove exploitability
  • Agentic Pentesting
    Automate real-world attack techniques
  • API Security Testing
    Discover and test APIs
  • Attack Surface Management
    Identify exposed apps and endpoints
  • Cloud AppSec
    Get a single-pane view of cloud app risk
  • AI AppSec
    Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
  • Vulnerability Management (ASPM)
    Centralize and correlate AppSec findings
  • Compliance & Executive Reporting
    Measure risk and impact
  • Threat Intelligence
    Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Invicti Enterprise On-Premises
/
v25.5.0 - 22 May 2025
Invicti Product Release Notes
Invicti Enterprise On-Demand
Invicti Enterprise On-Premises
Invicti Standard
Invicti Application Security Platform
May 22, 2025

v25.5.0 - 22 May 2025

New features

  • Implemented webapp for secure storage and retrieval of passwords for Pre-Request scripts
  • Added an integration for NTA with NGINX (Read more)

Improvements

  • Implemented default limit setting to 1000 without flag for all fields except Second Level Domains
  • Implemented custom field Parent option in integration with Azure Boards
  • Implemented agent for secure storage and retrieval of passwords for Pre-Request scripts

Resolved issues

  • Resolved an issue on the Technologies Dashboard
  • The 'Tags' filter in All Issues now works correctly when using the 'Not Contains' condition
  • Resolved issue where no results appeared when filtering the target list on the Target Group page. This was linked to the 'View Target List' permission
  • Resolved communication issues in the TestBasicAuthCredentials process and improved HTTP connection handling
  • Resolved an issue where not all attributes were exported correctly from the Issues page
  • Fixed an issue with Bad Request Response on Scan Summary
  • Fixed naming issues of WordPress plugin Contact Form 7
  • Fixed the issue of LoginRequiredUrl and Pre-Request script requests causing bottlenecks in HTTP requests
  • Fixed an issue that unnecessarily included the code parameter in OAuth2 authorization requests
  • The scanning engine now correctly processes merged request headers received from browser
  • Resolved an issue where scans using cloud agents would occasionally fail after extended runtimes with an "agent unavailable" error

Notes for Verifying the Hash Value for Package Integrity in Invicti Enterprise On-Premises

The hash value for the "25.5.0.zip" file is provided below. You can verify the integrity of the file by checking its hash value using one of the methods outlined above:
Release Package Hash Value: F89BE5A51ACC8F1AC6AAE11A620B95B208FE26C9F128FCA297A65E45796E7C61

Methods to Verify the Hash Value:

PowerShell (Windows):

Get-FileHash -Path "25.5.0.zip" -Algorithm SHA256Command Prompt (Windows):

certutil -hashfile "25.5.0.zip" SHA256Linux or macOS:

sha256sum "25.5.0.zip"

Invicti Security Corp
7171 Southwest Parkway, Bldg 300, Suite 475
Austin TX 78735
© Invicti {year}
Resources
BlogFeaturesIntegrationsPlansCase StudiesRelease NotesInvicti Learn
Use Cases
Penetration Testing SoftwareWebsite Security ScannerEthical Hacking SoftwareWeb Vulnerability ScannerComparisonsOnline Application Scanner
Web Security
The Problem with False PositivesWhy Pay for Web ScannersSQL Injection Cheat SheetGetting Started with Web SecurityVulnerability IndexUsing Content Security Policy to Secure Web Applications
Comparison
Acunetix vs. InvictiBurp Suite vs. InvictiCheckmarx vs. InvictiProbely vs. InvictiQualys vs. InvictiTenable Nessus vs. Invicti
Company
About UsContact UsDocumentationCareersResourcesPartners

Invicti Security is changing the way web applications are secured. Invicti’s dynamic and interactive application security products help organizations in every industry scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.

LegalPrivacy PolicyCalifornia Privacy RightsTerms of UseAccessibilitySitemap
Privacy Policy