Form validation ensures that users enter correct information into data entry fields. This can include the data itself, lack thereof, or formatted a certain way. When any validation constraints are not met…
Pega Infinity™ includes an industry-standard patch release process to simplify and maintain high-quality releases. Several cumulative patches are released a year for each release stream. The Resolved…
Pega continually works to implement security controls that are designed to protect client environments. With this focus, the Pega Robotics team has identified a security vulnerability, affecting the Pega…
Issue Currency control displays a double currency sign in Theme Cosmos UI after a Pega Platform™ 25.1.1 upgrade. Symptoms After upgrading a Theme Cosmos application to Pega Platform 25.1.1 users…
Executive Summary- Action Required Apache Software Foundation has issued critical severity vulnerabilities CVE-2025-54988 and CVE-2025-66516 impacting multiple versions of Apache Tika (tika-parser-pdf-…
For Pega 8.3, we released an “early preview” of Cosmos Work, a new UX framework built around case management, AI, and collaboration. Cosmos is chock-full of new features, so If you’re unfamiliar with it…
A revolutionary new design system We’re introducing an early preview of “Cosmos Work”, a new design system theme created for employees managing daily workflows. In the near future we'll be offering…
Overview The Data-Admin-Security-AccessTokenKeys store contains environment-specific cryptographic key pairs used to sign JWT access tokens and to decrypt and validate OAuth tokens issued by the system.…
Executive Summary - Action Required Pega regularly implements security controls designed to safeguard client environments. As part of these efforts, Pega has released patch updates and hotfixes…
Read More
0
Replies
558
Views
We'd prefer it if you saw us at our best.
Pega Collaboration Center has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.