<?xml version="1.0" encoding="UTF-8"?>
<!-- AUTOGENERATED FILE. DO NOT EDIT. -->
<feed xmlns="http://www.w3.org/2005/Atom">
  <id>tag:google.com,2016:apigee-release-notes</id>
  <title>Apigee - Release notes</title>
  <link rel="self" href="https://docs.cloud.google.com/feeds/apigee-release-notes.xml"/>
  <author>
    <name>Google Cloud Platform</name>
  </author>
  <updated>2026-04-09T00:00:00-07:00</updated>

  <entry>
    <title>April 09, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#April_09_2026</id>
    <updated>2026-04-09T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#April_09_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee X</h2>
<h3>Change</h3>
<p><strong>Relaxed limitation on header name for Client IP resolution</strong></p>
<p>The client IP can now be resolved from any header, not just the <code>X-Forwarded-For</code> header. The most common headers are <code>X-Forwarded-For</code> or <code>True-Client-Ip</code>.</p>
<p>For more information, see <a href="https://docs.cloud.google.com/apigee/docs/api-platform/system-administration/client-ip-resolution">Client IP resolution</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>April 06, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#April_06_2026</id>
    <updated>2026-04-06T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#April_06_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee API hub</h2>
<strong class="release-note-product-version-title">VERSION_UNSPECIFIED</strong>
<h3>Feature</h3>
<p><strong>Agent Registry integration support for MCP metadata (Preview)</strong></p>
<p>API hub now includes a managed integration with Agent Registry to automatically synchronize Model Context Protocol (MCP) servers and tools metadata. This feature enables AI agents to discover and interact with the APIs registered in your hub without manual configuration.</p>
<p>This feature is in <a href="https://cloud.google.com/products#product-launch-stages">Public Preview</a>. For more information, see <a href="https://docs.cloud.google.com/apigee/docs/apihub/manage-agent-registry-integration">Manage Agent Registry integration</a>.</p>
<h2 class="release-note-product-title">Apigee X</h2>
<h3>Fixed</h3>
<p><strong>Correction to <a href="#April_02_2026">April 2, 2026 release note: Deployment disruption for Apigee Drupal Portal via Google Cloud Marketplace</a></strong></p>
<p>For the deployment disruption announced on April 2, the announcement noted that deployment and management functionality using Google Cloud Deployment Manager would definitely be unavailable during the transition. This statement is incorrect. The functionality <em>might</em> be unavailable.</p>
<p>See the <a href="https://docs.cloud.google.com/apigee/docs/release/known-issues#495305258">Known issue</a> for more information.</p>
<h3>Change</h3>
<p>On April 6th, 2026, we released an updated version of Apigee.</p>
<p>This change introduces the new <code>apigee.coreServiceAgent</code> IAM role for
Apigee. <strong>Effective immediately, use <code>apigee.coreServiceAgent</code> instead of the
<code>apigee.serviceAgent</code> role.</strong></p>
<p>For information on the new role, see
<a href="https://docs.cloud.google.com/iam/docs/roles-permissions/apigee#apigee.coreServiceAgent"><code>apigee.coreServiceAgent</code></a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>April 02, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#April_02_2026</id>
    <updated>2026-04-02T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#April_02_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee X</h2>
<h3>Breaking</h3>
<p><strong>Deployment disruption for Apigee Drupal Portal via Google Cloud Marketplace</strong></p>
<p>Google Cloud Deployment Manager was deprecated as of March 31, 2026. We are currently transitioning the Apigee Drupal Portal Marketplace solution to use Infrastructure Manager. During this transition period, some deployment and management functionalities are unavailable.</p>
<p><strong>Impact:</strong></p>
<ul>
<li><strong>New Deployments:</strong> Starting April 1, 2026, attempting to deploy a new Apigee Drupal Portal instance using the "Deploy" button on the Google Cloud Marketplace will fail.</li>
<li><strong>Existing Deployments:</strong> Your underlying resources (such as VMs and Cloud SQL databases) are unaffected and will continue to run normally. However, you can no longer use Deployment Manager-based features to manage the deployment via the Marketplace UI or the <code>gcloud deployment-manager</code> tool.</li>
</ul>
<p><strong>Workaround &amp; Resolution:</strong>
Any configuration changes or management tasks must be performed directly on the individual Google Cloud resources (Compute Engine, Cloud SQL, etc.) rather than through the Marketplace UI.</p>
<p>We are actively working to release the updated Infrastructure Manager-based solution.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>March 31, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#March_31_2026</id>
    <updated>2026-03-31T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#March_31_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee X</h2>
<h3>Announcement</h3>
<p>On March 31st, 2026, we released an updated version of Apigee.</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
<h3>Feature</h3>
<p><strong>General Availability (GA) launch of Model Context Protocol (MCP) in Apigee</strong></p>
<p>With this release, Model Context Protocol (MCP) in Apigee is <a href="https://docs.cloud.google.com/products#product-launch-stages">generally available</a>, enabling you to expose your Apigee APIs as MCP tools to agentic applications.</p>
<p>Any MCP client that supports remote MCP endpoints over HTTP/S can access these tools. Because the endpoints are managed, you don't need to install or manage local MCP servers, remote MCP servers, or additional infrastructure to enable agentic applications to access your services.</p>
<p>MCP in Apigee is available for Subscription, Pay-as-you-go, and Evaluation organizations, including organizations with Data Residency and VPC Service Controls enabled.</p>
<p>For more information on using MCP in Apigee, see <a href="https://docs.cloud.google.com/apigee/docs/api-platform/apigee-mcp/apigee-mcp-overview">MCP in Apigee overview</a>.</p>
<h3>Feature</h3>
<p><strong>Enhanced OAS server URL path handling for MCP in Apigee</strong></p>
<p>With this feature enhancement, your OpenAPI specification (OAS) configurations behave exactly
 as defined in the OAS standard, automatically combining the <code>server.url</code> base path value with individual operation paths.</p>
<p>For example, a server URL of<code>https://example.com/api/v1</code> paired with a path of <code>/users</code> will now correctly route to <code>https://example.com/api/v1/users</code> without additional manual intervention.</p>
<p>If you previously prepended base paths to your OAS paths entries, remove the path segment from your <code>servers.url</code> field to prevent
duplication.  For example, change <code>https://example.com/api/v1</code> to <code>https://example.com</code>.</p>
<p>For more information, see <a href="https://docs.cloud.google.com/apigee/docs/api-platform/apigee-mcp/apigee-mcp-quickstart#create-an-openapi-3.0.x-specification-describing-your-api-operations">Create an OpenAPI 3.0 specification</a>.</p>
<h3>Change</h3>
<p><strong>Updated MCP server target endpoint for MCP Discovery Proxies</strong></p>
<p>With the GA launch of Model Context Protocol (MCP) in Apigee, the structure of the MCP server target endpoint for MCP Discover Proxies has changed to <code>ORG_NAME.mcp.apigee.internal</code>.</p>
<p>Private preview customers using the previous format (<code>mcp.apigee.internal</code>) are encouraged to update their proxies to reflect the new structure.  Existing endpoints using the old format will continue to work, but new endpoints will use the new structure.</p>
<h3>Issue</h3>
<p><strong>Known Issue 496552286: Deployment fails for MCP Discovery Proxies in regions with capacity limitations.</strong></p>
<p>For more information, see <a href="https://docs.cloud.google.com/apigee/docs/release/known-issues">Apigee known issues</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>March 26, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#March_26_2026</id>
    <updated>2026-03-26T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#March_26_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee X</h2>
<h3>Announcement</h3>
<p>On March 26th, 2026, we released an updated version of Apigee (1-17-0-apigee-6).</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>495897297, 495909767</strong></td>
<td><strong>Security fix for Apigee infrastructure.</strong> <p>This addresses the following vulnerabilities: <ul> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33210">CVE-2026-33210</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25679">CVE-2026-25679</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27139">CVE-2026-27139</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27142">CVE-2026-27142</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33186">2026-33186</a></li></ul></p></td>
</tr>
</tbody>
</table>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Updates to infrastructure and libraries.</strong></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>March 19, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#March_19_2026</id>
    <updated>2026-03-19T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#March_19_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee X</h2>
<h3>Announcement</h3>
<p>On March 19th, 2026, we began maintenance updates of Apigee instances <a href="https://docs.cloud.google.com/apigee/docs/api-platform/system-administration/maintenance-windows">configured for maintenance windows</a>.</p>
<p>If you set a preferred window for maintenance for your instance, and your instance version is
below <strong>1-16-0-apigee-6</strong>, your instance will be updated to <strong>1-16-0-apigee-6</strong> within the
next seven to 21 days. A notification containing the expected date of upgrade will be sent within the next two business days.</p>
<aside class="note">Note: Instances that meet either of the following two criteria will <b>not</b> be updated:
<ul>
<li>Your instance has a DNS misconfiguration, as described in <a href="https://docs.cloud.google.com/apigee/docs/release/known-issues">Known Issue 445936920</a>.</li>
<li>Your instance uses an Apigee Java Library that has been removed, as described in <a href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_16_2025">Apigee release notes dated October 16, 2025</a>.</li>
</ul></aside>
<p>For more information on participating in scheduled maintenance windows, see <a href="https://docs.cloud.google.com/apigee/docs/api-platform/system-administration/maintenance">Maintenance overview</a> and <a href="https://docs.cloud.google.com/apigee/docs/api-platform/system-administration/maintenance-windows">Manage Apigee instance maintenance windows</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>March 17, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#March_17_2026</id>
    <updated>2026-03-17T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#March_17_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee Advanced API Security</h2>
<h3>Announcement</h3>
<p>On March 17, 2026 we released an updated version of Advanced API Security
abuse detection</p>
<h3>Feature</h3>
<p><strong>VPC-SC support in abuse detection</strong></p>
<p>This release includes full support in Advanced API Security abuse detection
for VPC-SC customers. This includes support for VPC-SC with the Advanced Anomaly
Detection ML model used for abuse detection, as well as detection exclusion
lists.</p>
<p>For usage information, see
<a href="https://docs.cloud.google.com/apigee/docs/api-security/abuse-detection">Abuse detection</a> in the
documentation.</p>
<h2 class="release-note-product-title">Apigee X</h2>
<h3>Announcement</h3>
<p>On March 17th, 2026, we released an updated version of Apigee (1-17-0-apigee-5).</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Updates to infrastructure and libraries.</strong></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>March 13, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#March_13_2026</id>
    <updated>2026-03-13T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#March_13_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee UI</h2>
<h3>Announcement</h3>
<p>On March 13, 2026, we released an updated version of the Apigee UI.</p>
<h3>Feature</h3>
<p><b>Manage environment-scoped Key Value Maps in the Apigee UI</b></p>
<p>You can now view, add, edit, and delete environment-scoped Key Value Map (KVM) entries in the Apigee UI.
For more information, see
<a href="https://docs.cloud.google.com/apigee/docs/api-platform/cache/key-value-maps">Using key value maps</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>March 12, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#March_12_2026</id>
    <updated>2026-03-12T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#March_12_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee hybrid</h2>
<strong class="release-note-product-version-title">v1.16.0</strong>
<h3>Fixed</h3>
<h4 id="fixed_in_this_release">Fixed in this release</h4>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>490308770</strong></td>
<td><strong>Fixed malformed <code>http_proxy</code> and <code>https_proxy</code> strings in Helm templates that occurred when using authenticated outbound proxy configurations.</strong></td>
</tr>
<tr>
<td><strong>488417252</strong></td>
<td><strong>Fixed an issue where the Apigee Operator guardrails pod failed to run on EKS with Workload Identity Federation (WIF) by ensuring it runs as the federated principal rather than the default service account.</strong></td>
</tr>
<tr>
<td><strong>485526221</strong></td>
<td><strong>Removed the deprecated <code>apigee-stackdriver-logging-agent</code> image from the <code>apigee-pull-push.sh</code> tool, resolving image pull failures during automated deployments.</strong></td>
</tr>
<tr>
<td><strong>484405364</strong></td>
<td><strong>Helm chart images with the <code>1.16.0-hotfix.1</code> tag are available for download.</strong></td>
</tr>
<tr>
<td><strong>482209901</strong></td>
<td><strong>Added the <code>watch</code> permission to the <code>apigee-manager</code> role to allow the controller to monitor Deployment resources and resolve watch failures in the namespace.</strong></td>
</tr>
<tr>
<td><strong>482077193</strong></td>
<td><strong>Fixed an issue where proxy chaining failed with HTTP 404 <code>route_not_found</code> errors in multi-organization, single-namespace configurations.</strong></td>
</tr>
<tr>
<td><strong>481793880</strong></td>
<td><strong>Fixed a bug in the <code>apigeeorg</code> admission webhook controller that prevented upgrading organizations when monetization was enabled.</strong></td>
</tr>
<tr>
<td><strong>479872706</strong></td>
<td><strong>Resolved an issue that prevented loading API products, apps, and developers after migrating data to Apigee hybrid 1.16.0 in configurations using Workload Identity Federation (WIF) with an HTTP Forward Proxy.</strong></td>
</tr>
<tr>
<td><strong>479040521</strong></td>
<td><strong>Resolved a regression where the <code>apigee-operator-guardrails-sa</code> ServiceAccount was not correctly created on AKS and EKS platforms with Federated Workload Identity enabled.</strong></td>
</tr>
</tbody>
</table>
<strong class="release-note-product-version-title">1.16.0-hotfix.1</strong>
<h3>Announcement</h3>
<h3 id="hybrid_1160-hotfix1">hybrid 1.16.0-hotfix.1</h3>
<p>On March 12, 2026 we released an update to Apigee hybrid 1.16.0-hotfix.1.</p>
<aside class="special"><strong>Important:</strong><span> If your installation is already on Apigee hybrid v1.16.0, use the following procedure to apply this hotfix. For new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/big-picture">The big picture</a> and then apply the hotfix to the new installation with the following instructions.</span></aside>
<h4 id="apply_this_hotfix_with_the_following_steps">Apply this hotfix with the following steps:</h4>
<aside class="note"><strong>Note:</strong><span> This release reflects a change to both the component images and the Helm chart templates.</span></aside>
<p>Apply this hotfix with the following steps:</p>
<ol>
<li>In your hybrid Helm charts directory, download the Apigee hybrid 1.16.0-hotfix.1 Helm charts into your hybrid Helm charts directory with the following commands:
<pre class="devsite-terminal">
export <b>CHART_REPO</b>=oci://us-docker.pkg.dev/apigee-release/apigee-hybrid-helm-charts
<code class="devsite-terminal">export <b>CHART_VERSION=1.16.0-hotfix.1</b></code>
<code class="devsite-terminal">helm pull <b>$CHART_REPO</b>/apigee-operator --version <b>$CHART_VERSION</b> --untar</code>
<code class="devsite-terminal">helm pull <b>$CHART_REPO</b>/apigee-datastore --version <b>$CHART_VERSION</b> --untar</code>
<code class="devsite-terminal">helm pull <b>$CHART_REPO</b>/apigee-env --version <b>$CHART_VERSION</b> --untar</code>
<code class="devsite-terminal">helm pull <b>$CHART_REPO</b>/apigee-ingress-manager --version <b>$CHART_VERSION</b> --untar</code>
<code class="devsite-terminal">helm pull <b>$CHART_REPO</b>/apigee-org --version <b>$CHART_VERSION</b> --untar</code>
<code class="devsite-terminal">helm pull <b>$CHART_REPO</b>/apigee-redis --version <b>$CHART_VERSION</b> --untar</code>
<code class="devsite-terminal">helm pull <b>$CHART_REPO</b>/apigee-telemetry --version <b>$CHART_VERSION</b> --untar</code>
<code class="devsite-terminal">helm pull <b>$CHART_REPO</b>/apigee-virtualhost --version <b>$CHART_VERSION</b> --untar</code>
</pre>
</li>
<li>Install the hotfix release for Apigee operators, beginning with a dry run:
<pre class="devsite-click-to-copy">
helm upgrade operator apigee-operator/ \
  --install \
  --namespace <var>APIGEE_NAMESPACE</var> \
  --atomic \
  -f overrides.yaml \
  --dry-run=server
</pre>
</li>
<li>After the dry run is successful, install the hotfix release for Apigee operators:
<pre class="devsite-click-to-copy">
helm upgrade operator apigee-operator/ \
  --install \
  --namespace <var>APIGEE_NAMESPACE</var> \
  --atomic \
  -f overrides.yaml
</pre>
</li>
<li>Install the hotfix release for your organization, beginning with a dry run:
<pre class="devsite-click-to-copy">
helm upgrade $ORG_NAME apigee-org/ \
  --install \
  --namespace <var>APIGEE_NAMESPACE</var> \
  --atomic \
  -f overrides.yaml \
  --dry-run=server
</pre>
</li>
<li>After the dry run is successful, install the hotfix release for your organization:
<pre class="devsite-click-to-copy">
helm upgrade $ORG_NAME apigee-org/ \
  --install \
  --namespace <var>APIGEE_NAMESPACE</var> \
  --atomic \
  -f overrides.yaml
</pre>
</li>
<li>Verify the organization chart by checking the state:
<pre class="devsite-click-to-copy">
kubectl -n <var>APIGEE_NAMESPACE</var> get apigeeorg
</pre>
</li>
<li>Install the hotfix release for your environments. Repeat the following steps for each environment, beginning with a dry run:
<pre class="devsite-click-to-copy">
helm upgrade <var>ENV_RELEASE_NAME</var> apigee-env/ \
  --install \
  --namespace <var>APIGEE_NAMESPACE</var> \
  --atomic \
  --set env=$ENV_NAME \
  -f overrides.yaml \
  --dry-run=server
</pre>
</li>
<li>After the dry run is successful, install the hotfix release for your environment:
<pre class="devsite-click-to-copy">
helm upgrade <var>ENV_RELEASE_NAME</var> apigee-env/ \
  --install \
  --namespace <var>APIGEE_NAMESPACE</var> \
  --atomic \
  --set env=$ENV_NAME \
  -f overrides.yaml
</pre>
</li>
<li>Verify the environment chart by checking the state:
<pre class="devsite-click-to-copy">
kubectl -n <var>APIGEE_NAMESPACE</var> get apigeeenv
</pre>
</li>
</ol>
]]>
    </content>
  </entry>

  <entry>
    <title>March 11, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#March_11_2026</id>
    <updated>2026-03-11T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#March_11_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee hybrid</h2>
<strong class="release-note-product-version-title">v1.15.2</strong>
<h3>Announcement</h3>
<h3 id="hybrid_v1152">hybrid v1.15.2</h3>
<p>On March 11, 2026 we released an updated version of the Apigee hybrid software, v1.15.2.</p>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/upgrade">Upgrading Apigee hybrid to version v1.15.2</a>.</li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/big-picture">The big picture</a>.</li>
</ul>
<aside class="note"><strong>Note:</strong><span> This is a patch release: The container images used in patch releases are integrated with the Apigee hybrid Helm charts. Upgrading to a patch via the Helm chart automatically updates the images. No manual image changes are typically needed. For information on container image support in Apigee hybrid releases, see <a href="https://docs.cloud.google.com/apigee/docs/release/apigee-release-process#apigee-hybrid-container-images">Apigee release process</a>.</span></aside>
<h3>Fixed</h3>
<h4 id="fixed_in_this_release_2">Fixed in this release</h4>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>469694040</strong></td>
<td><strong>Fixed an issue where custom Java security policies were intermittently not applied during runtime pod restarts or environment contract updates, which could lead to "Permission denied" errors in Java callouts.</strong></td>
</tr>
</tbody>
</table>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>471502899, 471173561</strong></td>
<td><strong>Security fixes for <code>apigee-synchronizer</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48924">CVE-2025-48924</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67735">CVE-2025-67735</a> </li></ul></td>
</tr>
<tr>
<td><strong>471502752, 471191392</strong></td>
<td><strong>Security fixes for <code>apigee-runtime</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48924">CVE-2025-48924</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67735">CVE-2025-67735</a> </li></ul></td>
</tr>
<tr>
<td><strong>471502495, 471501875, 471126425</strong></td>
<td><strong>Security fixes for <code>apigee-mart-server</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48924">CVE-2025-48924</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67735">CVE-2025-67735</a> </li></ul></td>
</tr>
<tr>
<td><strong>471016560, 471015664, 471015120</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40897">CVE-2022-40897</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47273">CVE-2025-47273</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48924">CVE-2025-48924</a> </li></ul></td>
</tr>
<tr>
<td><strong>451224723, 451224123</strong></td>
<td><strong>Security fixes for <code>apigee-fluent-bit</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">CVE-2010-4756</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2013-4392">CVE-2013-4392</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-3276">CVE-2015-3276</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-14159">CVE-2017-14159</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-17740">CVE-2017-17740</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">CVE-2018-20796</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-5709">CVE-2018-5709</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-6829">CVE-2018-6829</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010022">CVE-2019-1010022</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010023">CVE-2019-1010023</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010024">CVE-2019-1010024</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010025">CVE-2019-1010025</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">CVE-2019-9192</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-15719">CVE-2020-15719</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27943">CVE-2022-27943</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2953">CVE-2023-2953</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31437">CVE-2023-31437</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31438">CVE-2023-31438</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31439">CVE-2023-31439</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45853">CVE-2023-45853</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2236">CVE-2024-2236</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2379">CVE-2024-2379</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26458">CVE-2024-26458</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26461">CVE-2024-26461</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0725">CVE-2025-0725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-10148">CVE-2025-10148</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-27587">CVE-2025-27587</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-62813">CVE-2025-62813</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9086">CVE-2025-9086</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9230">CVE-2025-9230</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9232">CVE-2025-9232</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-asm-ingress</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24051">CVE-2026-24051</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-asm-istiod</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24051">CVE-2026-24051</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-connect-agent</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68119">CVE-2025-68119</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61732">CVE-2025-61732</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61731">CVE-2025-61731</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-4674">CVE-2025-4674</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra-client</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24051">CVE-2026-24051</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68119">CVE-2025-68119</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61732">CVE-2025-61732</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61731">CVE-2025-61731</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-4674">CVE-2025-4674</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-kube-rbac-proxy</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24051">CVE-2026-24051</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-open-telemetry-collector</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24051">CVE-2026-24051</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68156">CVE-2025-68156</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-4674">CVE-2025-4674</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-29786">CVE-2025-29786</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-open-telemetry-collector:</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-29786">CVE-2025-29786</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-operators</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-prom-prometheus</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24051">CVE-2026-24051</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68119">CVE-2025-68119</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61731">CVE-2025-61731</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-4674">CVE-2025-4674</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-prometheus-adapter</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24051">CVE-2026-24051</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68119">CVE-2025-68119</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61731">CVE-2025-61731</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-4674">CVE-2025-4674</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-redis</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68119">CVE-2025-68119</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61732">CVE-2025-61732</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61731">CVE-2025-61731</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-4674">CVE-2025-4674</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-stackdriver-logging-agent</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61594">CVE-2025-61594</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24294">CVE-2025-24294</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-udca</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24051">CVE-2026-24051</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68119">CVE-2025-68119</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61732">CVE-2025-61732</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61731">CVE-2025-61731</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907</a> </li></ul></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>March 10, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#March_10_2026</id>
    <updated>2026-03-10T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#March_10_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee API hub</h2>
<strong class="release-note-product-version-title">VERSION_UNSPECIFIED</strong>
<h3>Feature</h3>
<p><strong>Security monitoring condition support in Advanced API Security for multi-gateway projects</strong></p>
<p>Advanced API Security's multi-gateway Risk Assessment feature (available through
API hub) now includes support for security monitoring conditions and alerts.</p>
<p>Security monitoring conditions allow you to map resources (gateways) to security profiles.
Cloud Monitoring can then use this mapping to create dedicated dashboards to track security scores over time and alert based on metric levels.</p>
<p>For information on monitoring conditions features and usage see <a href="https://docs.cloud.google.com/apigee/docs/apihub/manage-monitoring-conditions-multi-gateway">Manage monitoring conditions for multiple Apigee organizations and gateways</a>.</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release to production instances might take up to 5 business days to complete across all Google Cloud zones. Your instances might not have the feature available until the rollout is complete.</span></aside>
<h3>Feature</h3>
<p><strong>Support for Apigee Edge Private Cloud (OPDK) in Advanced API Security for multi-gateway projects</strong></p>
<p>API hub Advanced API Security for multi-gateway now includes support for the OPDK
gateway type for risk assessment security profiles.</p>
<p>For information on risk assessment custom security profiles and gateway specification, see <a href="https://docs.cloud.google.com/apigee/docs/apihub/manage-security-profiles-multi-gateway#create-a-security-profile">Create a security profile</a>.</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release to production instances might take up to 5 business days to complete across all Google Cloud zones. Your instances might not have the feature available until the rollout is complete.</span></aside>
<h2 class="release-note-product-title">Apigee Advanced API Security</h2>
<h3>Announcement</h3>
<p>On March 10, 2026 we released an updated version of Advanced API Security Abuse Detection</p>
<h3>Feature</h3>
<p><strong>General availability of monitoring conditions in risk assessment v2</strong></p>
<p>Starting with this release, the risk assessment v2 monitoring conditions feature is generally available. </p>
<p>For information on monitoring conditions features and usage see <a href="https://docs.cloud.google.com/apigee/docs/api-security/security-scores#monitoring-conditions">monitoring conditions and alerts</a>. For usage information and a list of all features in Risk Assessment v2, see the <a href="https://docs.cloud.google.com/apigee/docs/api-security/security-scores#risk-assessment-v2">Risk Assessment v2 customer documentation</a>.</p>
<h2 class="release-note-product-title">Apigee X</h2>
<h3>Announcement</h3>
<p>On March 10th, 2026, we released an updated version of Apigee (1-17-0-apigee-4).</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Updates to infrastructure and libraries.</strong></td>
</tr>
</tbody>
</table>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>483769763, 481735779</strong></td>
<td><strong>Security fix for Apigee infrastructure.</strong> <p>This addresses the following vulnerabilities: <ul> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61728">CVE-2025-61728</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61730">CVE-2025-61730</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61731">CVE-2025-61731</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61732">CVE-2025-61732</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24051">CVE-2026-24051</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25765 ">CVE-2026-25765 </a></li></ul></p></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>March 05, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#March_05_2026</id>
    <updated>2026-03-05T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#March_05_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee Integrated Portal</h2>
<h3>Announcement</h3>
<p>On March 5, 2026 we released a new version of the Apigee integrated portal.</p>
<h3>Feature</h3>
<p>You can now publish APIs using AsyncAPI documents to render documentation for asynchronous APIs in your portal. For more information, see <a href="https://docs.cloud.google.com/apigee/docs/api-platform/publish/portal/publish-apis#what-published">Publishing your APIs</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>March 04, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#March_04_2026</id>
    <updated>2026-03-04T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#March_04_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee API hub</h2>
<strong class="release-note-product-version-title">VERSION_UNSPECIFIED</strong>
<h3>Feature</h3>
<p><strong>gcloud CLI support for API hub</strong></p>
<p>The <code>gcloud CLI</code> now supports Apigee API hub, allowing you to manage your organization's API catalog, versions, and lifecycle metadata directly from the command line.</p>
<p>For more information see <a href="https://docs.cloud.google.com/apigee/docs/apihub/gcloud-cli-apihub">gcloud CLI for API hub</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>February 24, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#February_24_2026</id>
    <updated>2026-02-24T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#February_24_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee X</h2>
<h3>Announcement</h3>
<p>On February 24th, 2026, we released an updated version of Apigee (1-17-0-apigee-3).</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>470375542</strong></td>
<td>Fixed a memory leak which could result in a spike in 503 responses with <code>no_healthy_upstream</code> messages.</td>
</tr>
<tr>
<td><strong>480997525</strong></td>
<td>Applied a fix for proxy calls failing with <code>The URI contains illegal characters</code> error after Netty upgrade.</td>
</tr>
<tr>
<td><strong>485595627</strong></td>
<td>Fixed an issue resulting in TLS handshake errors.</td>
</tr>
</tbody>
</table>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>481735779, 457138941, 471232237</strong></td>
<td><strong>Security fix for Apigee infrastructure.</strong> <p>This addresses the following vulnerabilities: <ul> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61730">CVE-2025-61730</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68156">CVE-2025-68156</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-54388">CVE-2025-54388</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61727">CVE-2025-61727</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729</a></li></ul></p></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>February 23, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#February_23_2026</id>
    <updated>2026-02-23T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#February_23_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee API hub</h2>
<strong class="release-note-product-version-title">VERSION_UNSPECIFIED</strong>
<h3>Feature</h3>
<p><strong>Preview release of specification boost</strong></p>
<p>API hub now supports the preview release of specification boost, an AI-powered
add-on that lets you automatically enhance the readability and discoverability
of your API specifications in API hub. It analyzes your existing specification
files and generates boosted versions enriched with richer details, including
additional examples, clearer descriptions, better error documentation, and more.</p>
<p>For more information see <a href="https://docs.cloud.google.com/apigee/docs/apihub/spec-boost">Specification boost add-on</a>.</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release to production instances might take up to 5 business days to complete across all Google Cloud zones. Your instances might not have the feature available until the rollout is complete.</span></aside>
]]>
    </content>
  </entry>

  <entry>
    <title>February 13, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#February_13_2026</id>
    <updated>2026-02-13T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#February_13_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee UI</h2>
<h3>Announcement</h3>
<p>On February 13, 2026, we released an updated version of the Apigee UI.</p>
<h3>Change</h3>
<p>Updated the route for Operations Anomalies from <code>apigee/analytics/operations-anomalies</code> to <code>apigee/aapi-ops/operations-anomalies</code>.</p>
<h2 class="release-note-product-title">Apigee X</h2>
<h3>Announcement</h3>
<p>On February 13, 2026, we published a security bulletin for Apigee.</p>
<h3>Security</h3>
<p>A vulnerability was identified in the Apigee platform (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13292">CVE-2025-13292</a>) that could have allowed a malicious actor with administrative or developer-level permissions in their own Apigee environment to elevate privileges and access cross-tenant data.</p>
<p><strong>Security bulletin published: <a href="https://docs.cloud.google.com/apigee/docs/security-bulletins/security-bulletins#gcp-2026-010">GCP-2026-010</a></strong></p>
]]>
    </content>
  </entry>

  <entry>
    <title>February 10, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#February_10_2026</id>
    <updated>2026-02-10T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#February_10_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee X</h2>
<h3>Announcement</h3>
<aside class="note"><strong>Note:</strong><span> This release was rolled back to address an issue. See the entry for <a href="https://docs.cloud.google.com/apigee/docs/release-notes#February_24_2026">February 24th, 2026</a> for the updated version number and payload.</span></aside>
<p>On February 10, 2026, we released an updated version of Apigee (1-17-0-apigee-2).</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
<h3>Security</h3>
<aside class="note"><strong>Note:</strong><span>  This note is incorrect - these security fixes, including the removal of support for the <code>TLS_RSA</code> cipher suites, were rolled back. See the entry for <a href="https://docs.cloud.google.com/apigee/docs/release-notes#February_24_2026">February 24th, 2026</a> for the updated version number and payload.</span></aside>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>481735779, 457138941, 471232237</strong></td>
<td><strong>Security fix for Apigee infrastructure.</strong> <p>This addresses the following vulnerabilities: <ul> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61730">CVE-2025-61730</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68156">CVE-2025-68156</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-54388">CVE-2025-54388</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61727">CVE-2025-61727</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729</a></li></ul></p></td>
</tr>
<tr>
<td><strong>470375542</strong></td>
<td>Fixed a memory leak which could result in a spike in 503 responses with <code>no_healthy_upstream</code> messages.</td>
</tr>
<tr>
<td><strong>480997525</strong></td>
<td>Applied a fix for proxy calls failing with <code>The URI contains illegal characters</code> error after Netty upgrade.</td>
</tr>
<tr>
<td><strong>485543125</strong></td>
<td>Apigee no longer supports the following <code>TLS_RSA</code> cipher suites:<ul><li><code>TLS_RSA_WITH_AES_256_GCM_SHA384</code></li><li><code>TLS_RSA_WITH_AES_128_GCM_SHA256</code></li><li><code>TLS_RSA_WITH_AES_256_CBC_SHA256</code></li><li><code>TLS_RSA_WITH_AES_128_CBC_SHA256</code></li><li><code>TLS_RSA_WITH_AES_256_CBC_SHA</code></li><li><code>TLS_RSA_WITH_AES_128_CBC_SHA</code></li></ul></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>February 06, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#February_06_2026</id>
    <updated>2026-02-06T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#February_06_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee X</h2>
<h3>Announcement</h3>
<p>On February 6th, 2026, we released an updated version of Apigee.</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>477294854, 477297075, 477297324, 470988850, 471662549</strong></td>
<td><strong>Security fix for Apigee infrastructure.</strong> <p>This addresses the following vulnerabilities:<ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61727">CVE-2025-61727</a></li></ul></p></td>
</tr>
</tbody>
</table>
<h2 class="release-note-product-title">Apigee hybrid</h2>
<strong class="release-note-product-version-title">1.16.0-hotfix.1</strong>
<h3>Announcement</h3>
<h3 id="hybrid_1160-hotfix1_2">hybrid 1.16.0-hotfix.1</h3>
<p>On February 6, 2026 we released Apigee hybrid 1.16.0-hotfix.1.</p>
<aside class="special"><strong>Important:</strong><span> If your installation is already on Apigee hybrid v1.16.0, use the following procedure to apply this hotfix. For new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/big-picture">The big picture</a> and then apply the hotfix to the new installation with the following instructions.</span></aside>
<h4 id="apply_this_hotfix_with_the_following_steps_2">Apply this hotfix with the following steps:</h4>
<aside class="note"><strong>Note:</strong><span> This hotfix installs the <code>apigee-mart-server</code> container images. All other container images are unchanged from Hybrid v1.16.0.</span></aside>
<ol>
<li>In your overrides file, update the <code>image.url</code> and <code>image.tag</code> properties of <code>ao</code> and <code>mart</code> to version <code>1.16.0-hotfix.1</code>:
<pre class="devsite-click-to-copy">
ao:
  image:
    url: "gcr.io/apigee-release/hybrid/apigee-operators"
    tag: "1.16.0-hotfix.1"

mart:
  image:
    url: "gcr.io/apigee-release/hybrid/apigee-mart-server"
    tag: "1.16.0-hotfix.1"
</pre>
</li>
<li>Install the hotfix release for Apigee operators, beginning with a dry run:
<pre class="devsite-click-to-copy">
helm upgrade operator apigee-operator/ \
  --install \
  --namespace <var>APIGEE_NAMESPACE</var> \
  --atomic \
  -f overrides.yaml \
  --dry-run=server
</pre>
</li>
<li>If the dry run is successful, install the hotfix release for Apigee operators:
<pre class="devsite-click-to-copy">
helm upgrade operator apigee-operator/ \
  --install \
  --namespace <var>APIGEE_NAMESPACE</var> \
  --atomic \
  -f overrides.yaml
</pre>
</li>
<li>Install the hotfix release for your organization, beginning with a dry run:
<pre class="devsite-click-to-copy">
helm upgrade $ORG_NAME apigee-org/ \
  --install \
  --namespace <var>APIGEE_NAMESPACE</var> \
  --atomic \
  -f overrides.yaml \
  --dry-run=server
</pre>
</li>
<li>If the dry run is successful, install the hotfix release for your organization:
<pre class="devsite-click-to-copy">
helm upgrade $ORG_NAME apigee-org/ \
  --install \
  --namespace <var>APIGEE_NAMESPACE</var> \
  --atomic \
  -f overrides.yaml
</pre>
</li>
<li>Verify the organization chart by checking the state:
<pre class="devsite-click-to-copy">
kubectl -n <var>APIGEE_NAMESPACE</var> get apigeeorg
</pre>
</li>
<li>Install the hotfix release for your environment, beginning with a dry run:
<pre class="devsite-click-to-copy">
helm upgrade <var>ENV_RELEASE_NAME</var> apigee-env/ \
  --install \
  --namespace <var>APIGEE_NAMESPACE</var> \
  --atomic \
  --set env=$ENV_NAME \
  -f overrides.yaml \
  --dry-run=server
</pre>
</li>
<li>If the dry run is successful, install the hotfix release for your environment:
<pre class="devsite-click-to-copy">
helm upgrade <var>ENV_RELEASE_NAME</var> apigee-env/ \
  --install \
  --namespace <var>APIGEE_NAMESPACE</var> \
  --atomic \
  --set env=$ENV_NAME \
  -f overrides.yaml
</pre>
</li>
<li>Verify the environment chart by checking the state:
<pre class="devsite-click-to-copy">
kubectl -n <var>APIGEE_NAMESPACE</var> get apigeeenv
</pre>
</li>
</ol>
<strong class="release-note-product-version-title">v1.16.0</strong>
<h3>Fixed</h3>
<h4 id="fixed_in_this_release_3">Fixed in this release</h4>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>479872706</strong></td>
<td><strong>An issue that prevented loading API products, apps, and developers after migrating data to Apigee hybrid 1.16.0 in certain configurations has been resolved.</strong></td>
</tr>
<tr>
<td><strong>481793880</strong></td>
<td><strong>An issue that prevented upgrading an existing organization when monetization was enabled has been fixed.</strong></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>February 03, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#February_03_2026</id>
    <updated>2026-02-03T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#February_03_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee Advanced API Security</h2>
<h3>Announcement</h3>
<p>On February 3, 2026 we released an updated version of Advanced API Security
security actions</p>
<h3>Feature</h3>
<p><strong>Support for configuring two condition types within a single security action</strong>
Announcing the availability of support for two condition types
in a single security action. For example, you can include both IP addresses and
ASN numbers in the same security action.</p>
<p>This feature is available in Apigee and Apigee hybrid 1.16.0 and later.</p>
<p><strong>Note:</strong> This feature is available when configuring the security action
via the API, not the UI, at this time.</p>
<p>For usage information, see <a href="https://docs.cloud.google.com/apigee/docs/api-security/security-actions-api#configure-multiple-condition-types">Configure multiple condition types</a> in the documentation.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>February 02, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#February_02_2026</id>
    <updated>2026-02-02T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#February_02_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee X</h2>
<h3>Issue</h3>
<p><strong>Known Issue:</strong> <a href="https://docs.cloud.google.com/apigee/docs/release/known-issues#480997525">480997525 - Proxy calls fail with <code>The URI contains illegal characters</code> error after Netty upgrade</a></p>
]]>
    </content>
  </entry>

  <entry>
    <title>January 27, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#January_27_2026</id>
    <updated>2026-01-27T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#January_27_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee UI</h2>
<h3>Announcement</h3>
<p>On January 27, 2026, we released an updated version of the Apigee UI.</p>
<h3>Fixed</h3>
<p><b>Show all rows in the Debug properties panel</b></p>
<p>Fixed an issue where only the first 50 rows were displayed in the Debug
properties panel, including the variables tab. The Debug properties table now
displays up to 200 rows per page by default. Pagination controls are displayed
if the total number of rows exceeds 200.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>January 21, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#January_21_2026</id>
    <updated>2026-01-21T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#January_21_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee X</h2>
<h3>Announcement</h3>
<p>On January 21st, 2026, we released an updated version of Apigee (1-17-0-apigee-1).</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>471001896, 469829527, 470953822, 462478248, 474415498</strong></td>
<td><strong>Security fix for Apigee infrastructure.</strong> <p>This addresses the following vulnerabilities:<ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68161">CVE-2025-68161</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67735">CVE-2025-67735</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47914">CVE-2025-47914</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58181">CVE-2025-58181</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58767">CVE-2025-58767</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-4802">CVE-2025-4802</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-8058">CVE-2025-8058</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61727">CVE-2025-61727</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872</a></li></ul></p></td>
</tr>
</tbody>
</table>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>433999957</strong></td>
<td><strong>Implemented full TLS validation when fetching JWKS from remote URIs</strong></td>
</tr>
<tr>
<td><strong>467762922</strong></td>
<td><strong>Quota enforcement logic for Server-Sent Events (SSE) updated</strong> <p>Quotas for SSE are now calculated strictly for events containing explicit token counts. The quota enforcement logic skips SSE that lack token usage metadata.</p></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Updates to security, infrastructure, and libraries.</strong></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>January 20, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#January_20_2026</id>
    <updated>2026-01-20T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#January_20_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee UI</h2>
<h3>Deprecated</h3>
<p><b>Debug v1 turndown</b></p>
<p>As of January 20, 2026, Debug v1 has been turned down and is no longer
available. Please use
<a href="https://docs.cloud.google.com/apigee/docs/api-platform/debug/trace">Debug v2</a>
(now referred to as Debug) for debugging API proxies.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>January 12, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#January_12_2026</id>
    <updated>2026-01-12T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#January_12_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee API hub</h2>
<strong class="release-note-product-version-title">VERSION_UNSPECIFIED</strong>
<h3>Feature</h3>
<p><strong>Ingest API Gateway metadata into API hub</strong></p>
<p>API hub now supports automatic metadata ingestion from <a href="https://docs.cloud.google.com/api-gateway/docs/about-api-gateway">Google Cloud API Gateway</a>. You can now <a href="https://docs.cloud.google.com/apigee/docs/apihub/auto-register-apigee-proxies#attach-a-runtime-project">attach</a> your API Gateway projects to API hub to enable auto-ingestion for all your APIs. For more information see <a href="https://docs.cloud.google.com/api-gateway/docs/api-hub-overview">Centralize API management using API hub</a>.</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release to production instances might take up to 5 business days to complete across all Google Cloud zones. Your instances might not have the feature available until the rollout is complete.</span></aside>
<h2 class="release-note-product-title">Apigee Advanced API Security</h2>
<h3>Announcement</h3>
<p>On January 12, 2026 we released an updated version of Advanced API Security Abuse Detection</p>
<h3>Feature</h3>
<p><strong>Introduction of Terraform support for managing Advanced API Security abuse detection exclusion lists</strong></p>
<p>You can now use Terraform to manage Advanced API Security abuse detection
exclusion lists. The feedback feature allows you to specify CIDR ranges and IP
addresses to exclude from future incident reports, and is used to exclude
traffic known to be safe, such as requests related to automated testing.</p>
<p><strong>Note:</strong> Exclusion lists are not available for VPC-SC customers at this time.</p>
<p>For usage information, see
<a href="https://docs.cloud.google.com/apigee/docs/api-security/abuse-detection#exclude-traffic-from-abuse-detection">Exclude traffic from abuse detection</a>
and <a href="https://docs.cloud.google.com/apigee/docs/api-platform/get-started/terraform-overview">Use Terraform in Apigee</a>
in the Apigee documentation and the
<a href="https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/apigee_security_feedback">
        Terraform abuse detection feedback (exclusion lists) instructions</a>.</p>
<h2 class="release-note-product-title">Apigee UI</h2>
<h3>Announcement</h3>
<p>On January 12, 2026, we released an updated version of the Apigee UI.</p>
<h3>Feature</h3>
<p><b>Manage environment-level resources in the Apigee UI</b></p>
<p>You can now manage environment-level resources using the Apigee UI.
Previously, environment-level resources could only be managed using the API.
For more information, see
<a href="https://docs.cloud.google.com/apigee/docs/api-platform/develop/resource-files#ui-env">
Managing resources</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>January 07, 2026</title>
    <id>tag:google.com,2016:apigee-release-notes#January_07_2026</id>
    <updated>2026-01-07T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#January_07_2026"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee Operator for kubernetes</h2>
<strong class="release-note-product-version-title">VERSION_UNSPECIFIED</strong>
<h3>Announcement</h3>
<p>On January 7, 2026, we released an updated version of Apigee.</p>
<h3>Feature</h3>
<p><strong>The Apigee Operator for Kubernetes version 1.1.1 is now available.</strong></p>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>471150886, 471150271, 471150102, 426783172</strong></td>
<td><strong>Security fixes for the Apigee Operator for Kubernetes.</strong> <p>This addresses the following vulnerabilities:<ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-55163">CVE-2025-55163</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67735">CVE-2025-67735</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58057">CVE-2025-58057</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-58056">CVE-2025-58056</a></li></ul></p></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>December 29, 2025</title>
    <id>tag:google.com,2016:apigee-release-notes#December_29_2025</id>
    <updated>2025-12-29T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#December_29_2025"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee X</h2>
<h3>Announcement</h3>
<p>On December 29th, 2025, we released an updated version of Apigee.</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
<h3>Feature</h3>
<p><strong>The Apigee Extension Processor provisioning API is available</strong></p>
<p>Apigee Extension Processor customers can now use the Extension Processor provisioning API to create traffic extensions.
For more information, see <a href="https://docs.cloud.google.com/apigee/docs/api-platform/service-extensions/extension-processor-quickstart#create-traffic-ext">Get started with the Apigee Extension Processor</a></p>
]]>
    </content>
  </entry>

  <entry>
    <title>December 23, 2025</title>
    <id>tag:google.com,2016:apigee-release-notes#December_23_2025</id>
    <updated>2025-12-23T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#December_23_2025"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee X</h2>
<h3>Announcement</h3>
<p>On December 23, 2025, we released an updated version of Apigee.</p>
<aside class="note"><b>Note:</b> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</aside>
<h3>Feature</h3>
<p><b>New Apigee policies for LLM Token Management are now Generally Available (GA)</b></p>
<p>Two new Apigee policies for managing Large Language Model (LLM) workloads are now Generally Available (GA). These policies provide fine-grained control and rate-limiting for AI application traffic as follows:</p>
<ul>
<li><b>LLMTokenQuota policy</b>
<ul>
<li>This policy monitors and enforces limits on <b>LLM response token usage</b> to control overall LLM expenditure and resource allocation.</li>
<li>It can be configured with <code>&lt;CountOnly&gt;</code> (placed in the response flow to track tokens consumed) or <code>&lt;EnforceOnly&gt;</code> (placed in the request flow to block calls if the quota is exceeded).</li>
<li>If the quota is reached, Apigee returns an <code>HTTP 429</code> (Too Many Requests) status code.</li>
<li>For more information, see <a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/llm-token-quota-policy">LLMTokenQuota Policy</a>.</li>
</ul>
</li>
<li><b>PromptTokenLimit policy</b>
<ul>
<li>This policy provides a token-based rate-limiting mechanism analogous to the SpikeArrest policy, specifically for the tokens consumed by the user's prompt message.</li>
<li>It calculates the prompt's token count using the widely adopted <code>o200k_base</code> encoding technique.</li>
<li>If the configured token rate limit is exceeded, the incoming request is blocked, returning an <code>HTTP 429</code> (Too Many Requests) status code.</li>
<li>For more information, see <a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/prompt-token-limit-policy">PromptTokenLimit policy</a>.</li>
</ul>
</li>
</ul>
<p><b>Related documents:</b></p>
<ul>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/tutorials/using-ai-token-policies">Get started with Apigee AI token policies</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/develop/rate-limiting">Rate-limiting</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/develop/comparing-quota-and-spike-arrest-policies">Comparing rate-limiting policies</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/publish/create-api-products">Managing API products</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/llm-token-quota-policy">LLMTokenQuota policy</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/prompt-token-limit-policy">PromptTokenLimit policy</a></li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>December 19, 2025</title>
    <id>tag:google.com,2016:apigee-release-notes#December_19_2025</id>
    <updated>2025-12-19T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#December_19_2025"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee Monetization</h2>
<h3>Announcement</h3>
<p>On December 19, 2025, we released an updated version of Apigee Monetization.</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release to production instances have begun. Rollout may
take four or more business days to complete across all Google Cloud zones. Your
instances may not have the feature available until the rollout is complete.</span></aside>
<h3>Feature</h3>
<p>Monetization now supports AppGroups. Use AppGroups to manage API product
subscriptions for all app developers in the AppGroup at the same time.</p>
<p>For more information, see
<a href="https://cloud.google.com/apigee/docs/api-platform/monetization/overview#use-appgroups-to-manage-api-product-subscriptions">Use AppGroups to manage API product subscriptions</a>.</p>
<h2 class="release-note-product-title">Apigee hybrid</h2>
<strong class="release-note-product-version-title">v1.16.0</strong>
<h3>Announcement</h3>
<h3 id="hybrid_v1160">hybrid v1.16.0</h3>
<p>On December 19, 2025 we released an updated version of the Apigee hybrid software, 1.16.0.</p>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/upgrade">Upgrading Apigee hybrid to version v1.16</a>.</li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/big-picture">The big picture</a>.</li>
</ul>
<aside class="note"><strong>Note:</strong><span> This is a minor release: The container images used in minor releases are integrated with the Apigee hybrid Helm charts. Upgrading to a minor via the Helm chart automatically updates the images. No manual image changes are typically needed. For information on container image support in Apigee hybrid releases, see <a href="https://docs.cloud.google.com/apigee/docs/release/apigee-release-process#apigee-hybrid-container-images">Apigee release process</a>.</span></aside>
<h3>Feature</h3>
<p><strong>Seccomp Profiles</strong></p>
<p>Apigee Hybrid now offers the capability to apply Seccomp Profiles to your runtime components, significantly enhancing the security posture of your deployment.</p>
<p>This feature allows Apigee administrators and security teams to restrict the system calls (syscalls) a containerized process can make to the host's kernel. By limiting a container to only the necessary syscalls, you can:</p>
<ul>
<li>Enhance Security: Mitigate the risk of container breakouts and privilege escalation.</li>
<li>Enforce Least Privilege: Ensure components only have access to the exact system calls required for their operation.</li>
<li>Meet Compliance: Provide a critical control for meeting stringent security compliance requirements.</li>
</ul>
<p>Seccomp profiles are not enabled by default. To enable the feature, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/configure-seccomp-profiles">Configure Seccomp profiles for pod security</a>.</p>
<h3>Feature</h3>
<p><strong><code>apigee-guardrails</code> service account</strong></p>
<p>In v1.16.0, Apigee Hybrid introduces an <code>apigee-guardrails</code> Google IAM service account. This is used by the <code>apigee-operator</code> chart during initial installation to check that all needed APIs are enabled in your project.</p>
<aside class="note"><strong>Note:</strong><span> The <code>apigee-guardrails</code> service account is required for both upgraded and new installations. See <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/upgrade#set-up-the-apigee-guardrails-service-account">Upgrading to Apigee hybrid to version 1.16: Set up the <code>apigee-guardrails</code> service account</a> for upgrade instructions.</span></aside>
<p>See:</p>
<ul>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/guardrails">Diagnosing issues with guardrails</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/sa-about#apigee-guardrails">About service accounts: <code>apigee-guardrails</code></a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/create-service-account"><code>create-service-account</code></a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/upgrade#changes-from-previous-version">Upgrading to Apigee hybrid to version 1.16</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/install-service-accounts">Installation Part 2: Step 4: Create service accounts</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/install-sa-authentication">Installation Part 2: Step 5: Set up service account authentication</a></li>
</ul>
<h3>Change</h3>
<p><strong>UDCA component removed</strong></p>
<p>In Apigee hybrid v1.16, the Unified Data Collection Agent (UDCA) component has been removed. The responsibilities of sending analytics, trace, and deployment status data to the Apigee control plane are now handled using a <a href="https://docs.cloud.google.com/pubsub/docs">Google Cloud Pub/Sub</a> based data pipeline. Using the Pub/Sub based data pipeline has been the default data collection mechanism since <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1140">Apigee hybrid v1.14.0</a>.</p>
<h3>Change</h3>
<p><strong>Support for cert-manager release 1.18 and 1.19</strong></p>
<p>Apigee hybrid v1.16 supports cert-manager release 1.18 and 1.19.</p>
<aside class="note"><strong>Note:</strong><span> cert-manager release 1.18 introduces a change to the default certificate <code>Spec.PrivateKey.RotationPolicy</code> value that can impact traffic on upgraded Apigee hybrid installations. This does not affect new installations of Apigee Hybrid. See <a href="https://docs.cloud.google.com/apigee/docs/release/known-issues#465834046">Known issue 465834046</a>.</span></aside>
<h3>Fixed</h3>
<h4 id="fixed_in_this_release">Fixed in this release</h4>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>448647917</strong></td>
<td><strong>Fixed a issue where non-SSL connections through a forward proxy could be improperly shared.</strong> (also fixed in <a href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_31_2025">Apigee 1-16-0-apigee-4</a>)</td>
</tr>
<tr>
<td><strong>442501403</strong></td>
<td><strong>Fixed an issue that caused incorrect target latency metrics in Apigee Analytics when a TargetEndpoint is configured with a &lt;LoadBalancer&gt;.</strong> (also fixed in <a href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_16_2025">Apigee 1-16-0-apigee-3</a>)</td>
</tr>
<tr>
<td><strong>438192028</strong></td>
<td><strong>Updated the geolocation database to mitigate stale IP-to-location mappings.</strong> (also fixed in <a href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_16_2025">Apigee 1-16-0-apigee-3</a>)</td>
</tr>
<tr>
<td><strong>437999897</strong></td>
<td><strong>Reduced the log level for failed geo IP lookups to address excessive log messages for private IP addresses.</strong> (also fixed in <a href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_16_2025">Apigee 1-16-0-apigee-3</a>)</td>
</tr>
<tr>
<td><strong>436323210</strong></td>
<td><strong>Fixed ingress cert keys to allow both <code>tls.key</code>/<code>key</code> and <code>tls.crt</code>/<code>cert</code>.</strong></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Updates to security, infrastructure, and libraries.</strong> (also fixed in <a href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_31_2025">Apigee 1-16-0-apigee-4</a>)</td>
</tr>
</tbody>
</table>
<h3>Fixed</h3>
<h4 id="fixed_since_last_minor_release">Fixed since last minor release</h4>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>451841788</strong></td>
<td><strong>Apigee hybrid required the <code>mintTaskScheduler.serviceAccountPath</code> property even when Monetization was not enabled.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>)</td>
</tr>
<tr>
<td><strong>451375397</strong></td>
<td><strong>The <code>apigee-pull-push.sh</code> script could return a No such image error message.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>)</td>
</tr>
<tr>
<td><strong>445912919</strong></td>
<td><strong>Unused files and folders have been removed from the Apigee hybrid Helm charts to prevent potential security exposure and streamline the product installation and upgrade process.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a>)</td>
</tr>
<tr>
<td><strong>442501403</strong></td>
<td><strong>Fixed an issue that caused incorrect target latency metrics in Apigee Analytics when a <code>TargetEndpoint</code> is configured with a <code>&lt;LoadBalancer&gt;</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a>)</td>
</tr>
<tr>
<td><strong>437999897</strong></td>
<td><strong>Reduced the log level for failed geo IP lookups to address excessive log messages for private IP addresses.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a>)</td>
</tr>
<tr>
<td><strong>431930277</strong>, <strong>395272878</strong></td>
<td><strong>When the configuration property <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/config-prop-ref#envs-managementcallsskipproxy"><code>envs.managementCallsSkipProxy</code></a> is set to <code>true</code> via helm for environment-level forward proxy, trace and analytics (which use <code>googleapis.com</code>) will skip forward proxy.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a>)</td>
</tr>
<tr>
<td><strong>423597917</strong></td>
<td><strong>Post of an <a href="https://docs.cloud.google.com/apigee/docs/reference/apis/apigee/rest/v1/organizations.appgroups.apps.keys/updateAppGroupAppKey"><code>AppGroupAppKey</code></a> scopes should result in insert operation instead of update.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>)</td>
</tr>
<tr>
<td><strong>420675540</strong></td>
<td><strong>Fixed Cassandra based replication for runtime contracts in synchronizer.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a>, <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1134">v1.13.4</a>)</td>
</tr>
<tr>
<td><strong>419578402</strong></td>
<td><strong>Mint-Mart forward proxy compatible.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>)</td>
</tr>
<tr>
<td><strong>416634326</strong></td>
<td><strong>Presence of istio.io Custom Resource Definitions (CRDs) in an Apigee hybrid cluster could cause failure in apigee-ingressgateway-manager pods.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a>, <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1134">v1.13.4</a>)</td>
</tr>
<tr>
<td><strong>414499328</strong></td>
<td><strong><code>ApigeeTelemetry</code> could become stuck in <code>creating</code> state</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1134">v1.13.4</a>)</td>
</tr>
<tr>
<td><strong>412740465</strong></td>
<td><strong>Fixed issue where zipkin headers were not generated by Apigee Ingress Gateway.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>)</td>
</tr>
<tr>
<td><strong>409048431</strong></td>
<td><strong>Fixes a vulnerability which could allow a SAML signature verification to be bypassed.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>)</td>
</tr>
<tr>
<td><strong>401746333</strong></td>
<td><strong>Fixed a <code>java.lang.ClassCircularityError</code> that could occur in Java Callouts due to an issue with the class loading mechanism.</strong>(Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>)</td>
</tr>
<tr>
<td><strong>395272878</strong></td>
<td><strong>Separate Forward proxy support for <code>googleapis.com</code> and <code>non-googleapis.com</code> runtime traffic.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>)</td>
</tr>
<tr>
<td><strong>393615439</strong></td>
<td><strong>OASValidation behavior for <code>allOf</code> with <code>additionalProperties: true</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_1142-hotfix1">1.14.2-hotfix.1</a>)</td>
</tr>
<tr>
<td><strong>382565315</strong></td>
<td><strong>A memory leak within the Security Policy has been addressed, improving system stability.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1134">v1.13.4</a>)</td>
</tr>
<tr>
<td><strong>378686709</strong></td>
<td><strong>The use of wildcards (*) in Apigee proxy basepaths would conflict with other explicit basepaths, resulting in a 404 error.</strong> To apply this fix, follow the procedure in <a href="https://docs.cloud.google.com/apigee/docs/release/known-issues#378686709">Known issue 378686709</a>. (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>)</td>
</tr>
<tr>
<td><strong>375360455</strong></td>
<td><strong>Updated apigee-runtime drain timeout to 300s to fix connection termination issue during pod termination.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1134">v1.13.4</a>)</td>
</tr>
<tr>
<td><strong>367815792</strong></td>
<td><strong>Two new Flow Variables: <code>app_group_app</code> and <code>app_group_name</code> have been added to VerifyApiKey and Access Token policy.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>)</td>
</tr>
</tbody>
</table>
<h3>Security</h3>
<h4 id="fixed_in_this_release_2">Fixed in this release</h4>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>452621774, 452381632, 441266643, 448498138</strong></td>
<td><strong>Security fix for Apigee infrastructure.</strong> (also fixed in <a href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_31_2025">Apigee 1-16-0-apigee-4</a>) <br/>This addresses the following vulnerabilities:<ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-53864">CVE-2025-53864</a><p>Updated Nimbus JWT library from 9.37.2 to 9.37.4, which introduced changes in behavior including changes to error string verbiage.</p></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-8916">CVE-2025-8916</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-5115">CVE-2025-5115</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40094">CVE-2024-40094</a></li></ul></td>
</tr>
<tr>
<td><strong>440419558, 433759657</strong></td>
<td><strong>Security fix for Apigee infrastructure.</strong> (also fixed in <a href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_16_2025">Apigee 1-16-0-apigee-3</a>) <p>This addresses the following vulnerabilities:<ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48924">CVE-2025-48924</a></li><aside class="note"><b>Note</b>: This fix updates a Java library that is included in Apigee.  Reliance on Java libraries that are included with Apigee is not supported. Those libraries are for Apigee product functionality only, and there's no guarantee that a library will be available from release to release. For more information, see <a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/java-callout-policy#Restrictions">Restrictions</a>.</aside></ul></p></td>
</tr>
<tr>
<td><strong>443902061</strong></td>
<td><strong>Security fix for Apigee infrastructure</strong> (also fixed in <a href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_16_2025">Apigee 1-16-0-apigee-3</a>) <p>This addresses the following vulnerability:<ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13292">CVE-2025-13292</a><p>Fixed an issue with improper access control that resulted in cross-tenant analytics modification and access to log data.</p></li></ul></p></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-asm-ingress</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-asm-istiod</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-connect-agent</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-fluent-bit</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9230">CVE-2025-9230</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra-client</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-kube-rbac-proxy</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mart-server</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066">CVE-2025-53066</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48913">CVE-2025-48913</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-13009">CVE-2024-13009</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-open-telemetry-collector</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-29786">CVE-2025-29786</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-operators</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-prom-prometheus</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48174">CVE-2022-48174</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-prometheus-adapter</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-redis</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-runtime</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48913">CVE-2025-48913</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-stackdriver-logging-agent</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24294">CVE-2025-24294</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-synchronizer</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48913">CVE-2025-48913</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-udca</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-watcher</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li></ul></td>
</tr>
</tbody>
</table>
<h3>Security</h3>
<h4 id="fixed_since_last_minor_release_2">Fixed since last minor release</h4>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>448498138</strong></td>
<td><strong>Security fixes for <code>apigee-runtime</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40094">CVE-2024-40094</a></li> </ul></td>
</tr>
<tr>
<td><strong>447367372</strong></td>
<td><strong>Security fixes for <code>apigee-runtime</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58057">CVE-2025-58057</a></li> </ul></td>
</tr>
<tr>
<td><strong>433952146</strong></td>
<td><strong>Security fix.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6763">CVE-2024-6763</a> </li></ul></td>
</tr>
<tr>
<td><strong>433951774</strong></td>
<td><strong>Security fix.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-7254">CVE-2024-7254</a> </li></ul></td>
</tr>
<tr>
<td><strong>433950558</strong></td>
<td><strong>Security fix.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47554">CVE-2024-47554</a> </li></ul></td>
</tr>
<tr>
<td><strong>433950370</strong></td>
<td><strong>Security fix.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-25193">CVE-2025-25193</a> </li></ul></td>
</tr>
<tr>
<td><strong>418557195</strong></td>
<td><strong>Security fixes for <code>apigee-fluent-bit</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a>) <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24528">CVE-2025-24528</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-4207">CVE-2025-4207</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1390">CVE-2025-1390</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26462">CVE-2024-26462</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-13176">CVE-2024-13176</a></li> </ul></td>
</tr>
<tr>
<td><strong>396944778</strong></td>
<td><strong>Security fixes for <code>apigee-synchronizer</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1134">v1.13.4</a>) <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-25193">CVE-2025-25193</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24970">CVE-2025-24970</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23184">CVE-2025-23184</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47554">CVE-2024-47554</a></li> </ul></td>
</tr>
<tr>
<td><strong>392934392</strong></td>
<td><strong>Security fixes for <code>apigee-logger</code>.</strong></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Incorporated an updated base image for <code>stackdriver-logging-agent</code>, improving the overall security of the service.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_1142-hotfix1">1.14.2-hotfix.1</a>) <br/>This addresses the following vulnerabilities (among others and not limited to): <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32221">CVE-2022-32221</a> </li> <li><a href="https://osv.dev/vulnerability/GHSA-jvgm-pfqv-887x">GHSA-jvgm-pfqv-887x</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-asm-ingress</code>.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-asm-istiod</code>.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-envoy</code>.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0395">CVE-2025-0395</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-fluent-bit</code>.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a>) <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-32990">CVE-2025-32990</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-32988">CVE-2025-32988</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra-client</code>.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra</code>.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>) <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23015">CVE-2025-23015</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24970">CVE-2025-24970</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra</code>.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23015">CVE-2025-23015</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-kube-rbac-proxy</code>.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mart-server</code>.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1134">v1.13.4</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mart-server</code>.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>) <br/>This addresses the following vulnerabilities: <ul> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48924">CVE-2025-48924</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48795">CVE-2025-48795</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48734">CVE-2025-48734</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24970">CVE-2025-24970</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47554">CVE-2024-47554</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47535">CVE-2024-47535</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-13009">CVE-2024-13009</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-8184">CVE-2024-8184</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-7254">CVE-2024-7254</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6763">CVE-2024-6763</a> </li> </ul></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>December 17, 2025</title>
    <id>tag:google.com,2016:apigee-release-notes#December_17_2025</id>
    <updated>2025-12-17T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#December_17_2025"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee API hub</h2>
<strong class="release-note-product-version-title">VERSION_UNSPECIFIED</strong>
<h3>Feature</h3>
<p><strong>Advanced API Security for multi-gateway projects</strong></p>
<p>Apigee Advanced API Security can now centrally manage and govern the security posture of your APIs across multiple Apigee projects, environments, and gateways. This enhancement leverages API hub to provide a single, unified view of your API security, helping you to identify risks and enforce standards consistently across your entire organization.</p>
<p>This enhancement introduces the following key capabilities:</p>
<ul>
<li><strong>Unified risk assessment:</strong> view and manage security scores for all your APIs in a centralized dashboard, regardless of which project, environment, or gateway they are deployed in.</li>
<li><strong>Customizable security profiles:</strong> create and manage custom security profiles and apply them consistently across your multi-gateway landscape.</li>
</ul>
<p>Supported gateways:</p>
<ul>
<li>Apigee X</li>
<li>Apigee hybrid</li>
<li>Apigee Edge Public Cloud</li>
</ul>
<p>To enable this feature, navigate to the <strong>Add-on management page</strong> in API hub and enable the <strong>Apigee Advanced API Security</strong> add-on.</p>
<p>Advanced API Security currently has limited support for VPC Service Controls (VPC-SC). To avoid potential feature limitations, we recommend enabling this add-on for API hub instances associated with Apigee organizations that don't have VPC-SC enabled.</p>
<p>For more information, see <a href="https://docs.cloud.google.com/apigee/docs/apihub/advanced-api-security-multi-gateway">Advanced API Security for multiple Apigee organizations and gateways</a>.</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this feature will begin today, and may take five or more business days to be completed across all Google Cloud zones. You may not be able to view or use this feature until the rollout is complete.</span></aside>
<h2 class="release-note-product-title">Apigee Advanced API Security</h2>
<h3>Announcement</h3>
<p>On December 17, 2025 we released an updated version of Advanced API Security
Risk Assessment</p>
<p><strong>Note:</strong> Rollouts of this release to production instances will begin within two
business days and may take four or more business days to complete across all
Google Cloud zones. Your instances may not have the feature available until the
rollout is complete.</p>
<h3>Feature</h3>
<p><strong>General availability of Risk Assessment v2 and support for assessments using additional policies</strong></p>
<p>Announcing the
<a href="https://cloud.google.com/products#product-launch-stages">general availability</a>
of Risk Assessment v2 and support for assessments using the VerifyIAM policy and
these three AI policies: SanitizeUserPrompt, SanitizeModelResponse, and
SemanticCacheLookup.</p>
<p><strong>Note:</strong> The Risk Assessment v2 monitoring conditions feature remains in preview.</p>
<p>For usage information, see <a href="https://docs.cloud.google.com/apigee/docs/api-security/security-scores">Risk Assessment overview and UI</a> in the documentation.</p>
<h3>Feature</h3>
<p><strong>New risk assessment type field when creating or updating a risk assessment version 2 custom security profile</strong></p>
<p>The API for creating and updating a version 2 risk assessment custom security
profile now includes a <code>risk_assessment_type</code> field to specify
whether the custom security profile applies to an Apigee/Apigee hybrid instance
or to API hub multi-gateway.</p>
<p>This field is optional and defaults to <code>APIGEE</code>; this is not a
breaking change for existing risk assessment users.</p>
<p>See <a href="https://docs.cloud.google.com/apigee/docs/reference/apis/apigee/rest/v1/organizations.securityProfilesV2">REST Resource: organizations.securityProfilesV2</a> for information on the new functionality.</p>
<h2 class="release-note-product-title">Apigee Integrated Portal</h2>
<h3>Announcement</h3>
<p>On December 17, 2025 we released a new version of the Apigee integrated portal.</p>
<h3>Fixed</h3>
<p><strong>Incorrect Cross-Origin-Opener-Policy header in developer portal</strong></p>
<p>A fix has been implemented to address an issue where the
<code>Cross-Origin-Opener-Policy</code> response header in the developer portal was
malformed with an extra colon. This change ensures the security header is
correctly formatted.</p>
<h2 class="release-note-product-title">Apigee UI</h2>
<h3>Announcement</h3>
<p>On December 17, 2025, we announced that Debug v1 will be shutdown on
January 15, 2026. Use
<a href="https://docs.cloud.google.com/apigee/docs/api-platform/debug/trace">Debug v2</a>
instead of Debug v1.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>December 15, 2025</title>
    <id>tag:google.com,2016:apigee-release-notes#December_15_2025</id>
    <updated>2025-12-15T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release-notes#December_15_2025"/>
    <content type="html"><![CDATA[<h2 class="release-note-product-title">Apigee API hub</h2>
<strong class="release-note-product-version-title">VERSION_UNSPECIFIED</strong>
<h3>Feature</h3>
<p><strong>New API card view</strong></p>
<p>A new card view is now available for APIs in API hub. This view provides a more visual and comprehensive way to browse, edit, and manage your APIs, complementing the existing list view. </p>
<p>The card view highlights key information for each API, such as the owner, last modified date, target users, gateway, API style, and business unit, to enhance discoverability and provide a richer at-a-glance overview of your API landscape.</p>
<p>You can switch between the list and card views from the <strong>API hub &gt; APIs</strong> page.</p>
]]>
    </content>
  </entry>

</feed>
