<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Plesk Obsidian Release Notes]]></title><description><![CDATA[Plesk Obsidian Release Notes]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/</link><generator>Plesk Docs</generator><lastBuildDate>Tue, 21 Apr 2026 07:06:15 GMT</lastBuildDate><copyright><![CDATA[&copy; 2026 WebPros International GmbH. All rights reserved. Plesk and the Plesk logo are trademarks of WebPros International GmbH.]]></copyright><item><title><![CDATA[Plesk Obsidian 18.0.76 Update 6]]></title><description><![CDATA[### Fixed Product Issues

#### Windows

- [!] This update addresses a critical security issue. We **strongly** recommend that you apply it as soon as possible.]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#plesk-18076-mu6</link><guid isPermaLink="false">3e57b5c85e86f77957f9827a1fd8224d</guid><pubDate>Tue, 21 Apr 2026 00:00:00 GMT</pubDate><product>plesk</product><version>18.0.76</version><release>18.0</release><update>76</update><fix>6</fix><latest>false</latest></item><item><title><![CDATA[Plesk Obsidian 18.0.77 Update 2]]></title><description><![CDATA[### Fixed Product Issues

- [-] Fixed an issue where Plesk would keep fetching information about APS applications after the APS Catalog support was disabled. (PPP-71391)

#### Windows

- [!] This update addresses a critical security issue. We **strongly** recommend that you apply it as soon as possible.]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#plesk-18077-mu2</link><guid isPermaLink="false">0902bf2f5480f51e284eee9cf6d4a0d4</guid><pubDate>Mon, 20 Apr 2026 00:00:00 GMT</pubDate><product>plesk</product><version>18.0.77</version><release>18.0</release><update>77</update><fix>2</fix><latest>false</latest></item><item><title><![CDATA[Watchdog 3.1.8]]></title><description><![CDATA[-   [*] Security improvements.]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#watchdog-3.1.8</link><guid isPermaLink="false">5c3f577d6c094e295a43795a7379f18c</guid><pubDate>Mon, 20 Apr 2026 00:00:00 GMT</pubDate><product>watchdog</product><version>3.1.8</version></item><item><title><![CDATA[Repair Kit 1.4.7]]></title><description><![CDATA[-   [*] Security improvements.]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#repair-kit-1.4.7</link><guid isPermaLink="false">14e009ed2a41319fdb0951f0e2855636</guid><pubDate>Mon, 20 Apr 2026 00:00:00 GMT</pubDate><product>repair-kit</product><version>1.4.7</version></item><item><title><![CDATA[PHP Composer 1.3.8]]></title><description><![CDATA[-   [*] Security improvements.]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#php-composer-1.3.8</link><guid isPermaLink="false">f89556dbdf8f65d1863f28ee9d894d96</guid><pubDate>Mon, 20 Apr 2026 00:00:00 GMT</pubDate><product>php-composer</product><version>1.3.8</version></item><item><title><![CDATA[Panel.ini Editor 3.2.14]]></title><description><![CDATA[-   [*] Security improvements.]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#panel-ini-editor-3.2.14</link><guid isPermaLink="false">05087fe13688a92ae1da21805eb483cd</guid><pubDate>Mon, 20 Apr 2026 00:00:00 GMT</pubDate><product>panel-ini-editor</product><version>3.2.14</version></item><item><title><![CDATA[NTP Timesync 1.3.7]]></title><description><![CDATA[-   [*] Security improvements.]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#ntp-timesync-1.3.7</link><guid isPermaLink="false">491d113ff6e1e41f3e7618d76ac48d84</guid><pubDate>Mon, 20 Apr 2026 00:00:00 GMT</pubDate><product>ntp-timesync</product><version>1.3.7</version></item><item><title><![CDATA[Node.js Toolkit 2.4.11]]></title><description><![CDATA[-   [*] Security improvements.]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#nodejs-2.4.11</link><guid isPermaLink="false">2c2cba78b83a6325396238735721a9cd</guid><pubDate>Mon, 20 Apr 2026 00:00:00 GMT</pubDate><product>nodejs</product><version>2.4.11</version></item><item><title><![CDATA[Log Browser 1.9.18]]></title><description><![CDATA[-   [*] Security improvements.]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#log-browser-1.9.18</link><guid isPermaLink="false">68d9dc741572e3f5993817f070d626af</guid><pubDate>Mon, 20 Apr 2026 00:00:00 GMT</pubDate><product>log-browser</product><version>1.9.18</version></item><item><title><![CDATA[Hosting Plan Exporter 1.1.6]]></title><description><![CDATA[-   [*] Fixed a PHP deprecation warning that appeared during the service plan export. (EXTPLESK-9679)]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#hosting-plan-exporter-1.1.6</link><guid isPermaLink="false">bd6161f863030c8ae058d73cc6b8598b</guid><pubDate>Mon, 20 Apr 2026 00:00:00 GMT</pubDate><product>hosting-plan-exporter</product><version>1.1.6</version></item><item><title><![CDATA[WP Toolkit 6.10.1]]></title><description><![CDATA[- [-] Enabling Vulnerability Protection no longer fails with "STDIN data is corrupted" error if there are many vulnerabilities to mitigate. (EXTWPTOOLK-14407)]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#wordpress-toolkit-6.10.1</link><guid isPermaLink="false">ef45f271c646f36ebd0105314f129e23</guid><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate><product>wordpress-toolkit</product><version>6.10.1</version></item><item><title><![CDATA[PHP Updates]]></title><description><![CDATA[- [*] Updated PHP 8.5 to version 8.5.5.
- [*] Updated PHP 8.4 to version 8.4.20.

### Linux

-   [*] Updated static ImageMagick used for Red Hat Enterprise Linux 8-based and later systems to 6.9.13-42 for PHP 8.4.
-   [*] Updated static ImageMagick used for Red Hat Enterprise Linux 8-based and later systems to 7.1.2-19 for PHP 8.5.
-   [*] Updated AVIF to version 1.4.1 for PHP 8.4, 8.5.]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#php-260415</link><guid isPermaLink="false">9277e16ca55ff05af71b8b47134c1c92</guid><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate><product>php</product><version>2026-04-15</version></item><item><title><![CDATA[WP Toolkit 6.10.0]]></title><description><![CDATA[- [+] Security Risk rating is now displayed for each WordPress component and website. The goal of this rating is to help site admins assess which vulnerable website or component they should take care about first. This feature introduces a lot of changes throught WP Toolkit:
  - "Vulnerabilities" widget was replaced by "Security Risk" widget
  - "WordPress Vulnerabilities" tab was redesigned and renamed to "Vulnerable Components". It now shows WordPress components with their Security Risk rating. Clicking on a component expands the view to show details about specific vulnerabilities
  - All actions on the "Vulnerable Components" tab have been moved inline or to the widgets at the top of the screen
  - "Vulnerabilities" label in the site card title was replaced by "Security Risk" label
  - "Sites" view on mass "Security" window was moved to a separate tab. It now has a separate Security Risk column that shows Security Risk rating for each site
  - "Updates" and "Vulnerability Protection" widgets were redesigned
  - WordPress installations can now be sorted by their Security Risk
  - Email notifications about new vulnerabilities were redesigned to focus on Security Risk rating changes
  - "Ignore Low-Risk Vulnerabilities" feature became pointless, so it was removed
- [+] Redesigned WP Toolkit plugin UI to support the Security Risk feature and related changes
- [+] Added the ability to change autoupdate settings to WP Toolkit plugin
- [+] Site administrators can now purchase Vulnerability Protection directly from the WP Toolkit plugin. Purchase URL can be customized via `purchaseDeluxeGuardianBaseUrl` parameter in `panel.ini` on Plesk and `whmVirtualPatchesUpsellUrl` parameter in `config.ini` on cPanel
- [+] Installing WP Toolkit plugin will switch WP Toolkit to using a secure one-time login link when logging in to WordPress from WP Toolkit
- [+] Link to WP Toolkit plugin inside WordPress admin area was moved under the "Dashboard" link in the left navigation menu. Server administrators can change the position of "WP Toolkit" link via `integrationPluginCustomizationsMenuPosition` option in the config file.
- [+] Added the ability to mass-install WP Toolkit plugin on all existing sites on a server. Set `rolloutIntegrationPluginToExistingSites` option to `true` in your config file to enable this behavior. Installation of the plugin is performed at a rate of 100 sites per hour to avoid causing significant server load. Note: this option will be enabled by default on all Plesk and cPanel servers purchased via retail channels
- [+] Scan for new sites can now be run automatically every 24 hours. To enable this, add `scanInstancesPeriodically = true` to your config file (`config.ini` on cPanel or `panel.ini` on Plesk)
- [+] Running `wp-cli instance info` now also shows the minor WordPress version available for update
- [+] Added name filters to "Plugins" and "Themes" tabs on the site card
- [+] Extended filters on global "Plugins" and "Themes" tabs to make sure list items can be filtered by domain and by component name
- [+] Server administrators can now prevent users from accidentally turning off Vulnerability Protection feature. This is done by adding `permissionNonAdminsManageVulnerabilityProtection = false` to your config file
- [+] The list of content-related database tables that can be optionally excluded during the Copy Data procedure was extended with the following WooCommerce HPOS database tables:
  - `_wc_orders`
  - `_wc_order_addresses`
  - `_wc_order_operational_data`
  - `_wc_orders_meta`
- [+] Server admins can now use `wpCronFrequency` config option to define how often `wp-cron.php` scheduled tasks should be executed by default. The default frequency was changed from every hour to every 5 minutes (12 times per hour).
- [+] "Take over wp-cron.php" option now always creates a replacement scheduled task (no extra action required)
- [+] Smart Update and Smart PHP Update procedures now generate text logs when the update prognosis is positive (only negative prognoses generated text logs previously)
- [+] WP Toolkit now properly supports cloning and copying data between WordPress installations that use W3 Total Cache plugin
- [+] (cPanel) WordPress security widget was added to WHM home page
- [+] (cPanel) WP Guardian (cPanel addon) 50 sites pack is now available for purchase in cPanel Store
- [+] (Plesk) WordPress security widget was added to Plesk Home screen
- [+] (Plesk) Vulnerability Protection status widget was added to Plesk Home page
- [+] (Plesk) Access to WP Toolkit can now be blocked in Restricted Mode (Plesk > "Tools & Settings" > "Restricted Mode Settings" > "Administrative Tools")
- [+] (Plesk) WP Guardian SaaS promo was added to the corresponding widget on the Plesk Home screen
- [*] WP Toolkit now pre-downloads the latest WordPress archive to the server's local package cache on clean installation and refreshes it once per day
- [*] Improved WP Toolkit performance for the following operations:
  - Site data refresh
  - Switching themes
  - Activating or deactivating plugins
- [*] WP Toolkit plugin performance was improved
- [*] Updated several feature icons
- [*] Default HTTP timeout for connecting to `wordpress.org` was increased from 15 seconds to 60 seconds
- [*] Multiple security improvements
- [*] CLI option `-password` is now fully deprecated for security reasons. `ADMIN_PASSWORD` environmental variable should be used instead
- [*] Optimized Smart PHP Updates feature screens to reduce the number of distracting texts
- [*] Improved reliability of WP Toolkit installation and update procedures
- [*] (Plesk) Users will now be warned that their subscription will be locked during and after Smart PHP Update if "PHP version and handler management" permission is disabled on the subscription
- [*] (Plesk) Improved the stability of working with `wp-cron.php` scheduled tasks
- [-] Installation path on the "Clone" screen is now refreshed properly after target domain is changed. (EXTWPTOOLK-13920)
- [-] Proper error message is now displayed if user tries to clone a multisite in the same domain. (EXTWPTOOLK-12836)
- [-] Smart Update no longer fails when it finds a page with redirect. (EXTWPTOOLK-12815)
- [-] Smart Update no longer fails if WPML plugin is used and sitemap generation is disabled in WordPress. (EXTWPTOOLK-6571)
- [-] Smart Update no longer fails if Redirection plugin is used. (EXTWPTOOLK-7655, EXTWPTOOLK-13317)
- [-] WP Toolkit UI no longer breaks if it encounters malformed UTF-8 characters in processed data. (EXTWPTOOLK-13253)
- [-] Duplicated message saying "Smart PHP Updates php handler switching was declined" no longer shown in "Logs" when Smart PHP Update is declined. (EXTWPTOOLK-14074)
- [-] Vulnerability-related confirmation popup is no longer shown when a blocklisted plugin happens to be selected during a bulk activation of plugins. (EXTWPTOOLK-14226)
- [-] "Install" button on the WordPress installation screen no longer unlocks prematurely after being clicked. (EXTWPTOOLK-14228)
- [-] (cPanel) WP Toolkit log files (`sw-engine` and `action-logs`) are now properly rotated when `ProtectSystem` is set to "full". (EXTWPTOOLK-13990)
- [-] (cPanel) WP Toolkit name is now properly displayed in browser tab titles. (EXTWPTOOLK-10775)
- [-] (cPanel) WP Toolkit now properly works on CloudLinux 9 Solo. (EXTWPTOOLK-14180)
- [-] (cPanel) Ongoing Smart Update or Smart PHP Update task can no longer prevent the user from accessing WP Toolkit interface under certain conditions. (EXTWPTOOLK-14238)
- [-] (Plesk) Orphaned WordPress installations are now properly cleaned up from WP Toolkit database during WP Toolkit update. (EXTWPTOOLK-11704)
- [-] (Plesk) Text on API documentation links located on "Remote API (REST)" screen is now displayed correctly in Restricted Mode. (EXTWPTOOLK-13915)
- [-] (Plesk) Errors are no longer shown in `panel.log` when discarding or applying Smart PHP updates. (EXTWPTOOLK-14125)]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#wordpress-toolkit-6.10.0</link><guid isPermaLink="false">efc125014c95413d79e3611bc7169147</guid><pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate><product>wordpress-toolkit</product><version>6.10.0</version></item><item><title><![CDATA[Plesk Obsidian 18.0.76 Update 5]]></title><description><![CDATA[### Changes in Third-Party Components

#### Linux

-   [-] Updated Roundcube 1.4.15 to backport fixes from 1.5.15, including [search issue](https://github.com/roundcube/roundcubemail/issues/10121)
-   [*] Updated Roundcube to version 1.6.15]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#plesk-18076-mu5</link><guid isPermaLink="false">7f05347a400140bd5235f7244335878d</guid><pubDate>Tue, 07 Apr 2026 00:00:00 GMT</pubDate><product>plesk</product><version>18.0.76</version><release>18.0</release><update>76</update><fix>5</fix><latest>false</latest></item><item><title><![CDATA[Plesk Obsidian 18.0.77 Update 1]]></title><description><![CDATA[### Fixed Product Issues

- [-] Fixed an issue where, after editing a file in Code Editor and saving the changes, the domain's home directory would be shown instead of the directory containing the file that was edited. (PPP-71308)

### Changes in Third-Party Components

- [*] Updated the OWASP ModSecurity CRS version to 4.25.0.

#### Linux

-   [-] Updated Roundcube 1.4.15 to backport fixes from 1.5.15, including [search issue](https://github.com/roundcube/roundcubemail/issues/10121)
-   [*] Updated Roundcube to version 1.6.15]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#plesk-18077-mu1</link><guid isPermaLink="false">d5a7e3f961bfc985791e5d9aa334447a</guid><pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate><product>plesk</product><version>18.0.77</version><release>18.0</release><update>77</update><fix>1</fix><latest>false</latest></item><item><title><![CDATA[BoldGrid Website Builder for WordPress 2.0.2]]></title><description><![CDATA[-   [*] Added Privacy Policy URL to extension metadata.]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#wordpress-toolkit-2.0.2</link><guid isPermaLink="false">ed065b7f59903a791778586f4bf06797</guid><pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate><product>wordpress-toolkit</product><version>2.0.2</version></item><item><title><![CDATA[Plesk Obsidian 18.0.77]]></title><description><![CDATA[### What's New?

- [+] Over the past year, we have completed a large‑scale update of the Plesk interface with a focus on accessibility. This work brings the product significantly closer to meeting the expectations of the European Accessibility Act and the WCAG 2.1 guidelines.

   Key changes delivered:

   - Updated around 200 of the most frequently used pages across the interface and most popular Plesk extensions
   - Improved compatibility with screen readers, including VoiceOver
   - Improved keyboard navigation across interactive elements
   - Clear and consistent focus indicators
   - Support for interface scaling up to 200%

   What it means to you:

   - Reduced compliance risk: your Plesk environment is now significantly closer to meeting EAA accessibility requirements, helping you prepare ahead of regulatory deadlines.
   - Better accessibility for all users: people who rely on assistive technologies, such as screen readers or keyboard‑only navigation can now use Plesk more reliably and independently.
- [+] (Plesk for Linux, except for CentOS 7 and CloudLinux 7) Introduced the support for a new web statistics tool for your websites, GoAccess. It is an open source web log analyzer and interactive viewer that delivers fast, actionable HTTP statistics and visual server reports, making it easy to monitor traffic, detect anomalies, and troubleshoot issues. [Learn more about GoAccess](https://goaccess.io/man#description).
- [+] Introducing [ACME SSL](https://www.plesk.com/extensions/acme/), an extension adding native ACME protocol support to Plesk. It integrates with the SSL It! extension to issue both wildcard and non‑wildcard SSL/TLS certificates. The extension can work with any ACME-compatible Certificate Authority, supports both HTTP‑01 and DNS‑01 challenge types, as well as External Account Binding (EAB), and can even automatically attempt to renew certificates before they expire.

### Feature Improvements

- [*] Plesk no longer requires an email address when users request SSL/TLS certificates from Let's Encrypt via the SSL It! extension.
- [*] Added the support for Debian 13 and AlmaLinux 10 to the [TuxCare Extended Lifecycle Support for PHP extension](https://www.plesk.com/extensions/tuxcare-php/).
- [*] Based on customer feedback, we rolled back the changes to the built-in Code editor. It will no longer open in a separate drawer. The support for tabs has also been re-added.

### Deprecated and Removed Items

- [!] The APS Catalog has been deprecated and removed from all Plesk Obsidian versions. Applications already installed from the APS Catalog will continue working. However, Plesk will no longer provide support for APS applications.
- [!] With the Plesk Obsidian 18.0.78 release, the support for the `ngx_pagespeed.so` module will be deprecated and removed from the `sw-nginx` package.

### Fixed Product Issues

- [-] Fixed an issue where, when restoring a password-protected scheduled backup stored in an AWS S3 bucket on a Plesk server other than the one the backup was created on, the field for entering the password was missing from the Plesk interface. (PPP-71211)
- [-] Fixed an issue where the promotional banner for the AI Website Generator would sometimes be shown for websites that did not have access to that feature, or not shown for websites that did have access. (PPP-71209)
- [-] Fixed an issue where, if the mailbox corresponding to the email address of a customer account in Plesk was hosted on the same Plesk server, changing the customer account password would result in the mailbox password changing as well. (PPPM-15329)
- [-] Fixed an issue where creating a backup including one or more MySQL databases would fail if the "skip-name-resolve = 1" directive was configured in the `/etc/mysql/my.cnf` file. (PPPM-15300)
- [-] Fixed an issue where the message shown when suspending a subscription incorrectly claimed that the mail service for the subscription would remain operational while the subscription was suspended. (PPPM-15167)

#### Linux

- [-] Fixed an issue where checking the connection to the smarthost configured in Plesk returned a generic "5.7.0 Must issue a STARTTLS command first" error message instead of the expected "5.7.8 Username and Password not accepted" if the configured smarthost credentials were incorrect. (PPPM-15330)
- [-] Fixed an issue where running the `plesk sbin statistics` command would return no errors if the calculation of web statistics failed. (PPP-71077)
- [-] Fixed an issue where moving emails between folders (for example, from "Inbox" to "Drafts") would subtract the size of those emails from the email account's disk usage shown both in webmail and the Plesk interface. (PPPM-15318)
- [-] Fixed an issue where restoring the data for an existing website with one or more mailboxes from backup would result in one of the mailboxes being removed with all contents if the "Mail" and "Domain configuration" checkboxes were not selected during the restoration. (PPPM-15307)
- [-] Fixed an issue where Cgroups Manager would sometimes send email notifications about RAM usage for a subscription exceeding the specified limit, while showing the usage data that was lower than the limit. (PPPM-15054)
- [-] Fixed an issue where using the "Find Joomla websites" in Joomla! Toolkit would fail to find existing Joomla! websites installed on add-on domains whose document root was inside the document root of the subscripton's main domain. (EXTPLESK-13576)
- [-] Fixed an issue where using the "Find Joomla websites" in Joomla! Toolkit would result in misleading error messages being written to the `panel.log` file. (EXTPLESK-10146)
- [-] Fixed an issue where, on the "Overview" tab of Joomla! Toolkit, the Joomla! core version would be shown as up-to-date even if a later version was available. (EXTPLESK-13528)
- [-] Fixed an issue where using the Plesk Email Security extension would result in misleading error messages being written to the `panel.log` file. (EXTPLESK-13560)
- [-] Fixed an issue where clicking **Log in** on the "AWS API Authorization" tab of the Amazon Route 53 extension failed with the "Error: Class PleskRoute53\GuzzleHttp\Psr7\Utils not found" even if the specified key and secret were correct. (EXTPLESK-13524, EXTPLESK-13525)
- [-] Fixed an issue where clicking **Sync All Zones** in the Amazon Route 53 extension interface would result in misleading error messages being written to the `panel.log` file. (EXTPLESK-10078)
- [-] Fixed an issue where new Plesk images were not available from `https://autoinstall.plesk.com/images/` immediately after publication. (PPP-68131)
- [-] Fixed an issue where, in SSL It!, "Certificate Authority" was shown as "none" if the certificate components were uploaded to Plesk as text. (EXTPLESK-10151)
- [-] Fixed an issue where, after migrating extension settings between two Plesk servers, on the target server, the Firewall extension in Plesk would show the same configuration as on the source server, but the corresponding iptables rules would not be created. (EXTPLESK-9745)

#### Windows

- [-] Fixed an issue where an outdated endpoint was used for downloading the Advanced ModSecurity Rules by Atomicorp rule set for IIS. (PPPM-15309)
- [-] Fixed an issue where event handlers including the "OLD_ASP.NET_SUPPORT" and/or "NEW_ASP.NET_SUPPORT" environment variables failed to execute correctly when triggered. (PPPM-15298)

### Changes in Third-Party Components

- [*] Updated nghttp2 to version 1.68.1.

#### Linux

- [+] Added the support for the `zstd` algorithm to the `php-redis` extension for Plesk PHP 8.2 and later.
- [*] Updated Roundcube to version 1.6.14.
- [*] Backported a number of security fixes delivered for Roundcube versions 1.6.14 and 1.5.14 to versions 1.4.x.
- [*] Updated the `sw-engine` PHP to version 8.4.19.
- [*] Updated libarchive to version 3.8.6.
- [*] Updated the OWASP ModSecurity CRS version to 4.24.1.
- [*] Updated the PostgreSQL client library to version 18.3.
- [*] Updated Phusion Passenger to version 6.1.2.
- [*] Updated libcurl to version 8.19.0.

#### Windows

- [+] Microsoft Drivers for PHP for SQL Server are now shipped with PHP 8.4 and 8.5.
- [*] Updated Node.js to versions 24.14.1, 22.22.2, and 20.20.2.
- [*] Updated the `plesk-engine` PHP to version 8.4.19.
- [*] Updated libcurl to version 8.19.0.
- [*] Updated .NET to versions 10.0.4, 9.0.14, and 8.0.25.
- [*] Updated Git for Windows to version 2.53.0.2.
- [*] Updated MailEnable Standard to version 10.55.
- [*] Updated the OWASP ModSecurity CRS version to 4.23.0.
- [*] Updated the OWASP ModSecurity PCRE2 version 10.47.
- [*] Updated POCO to version 1.15.0.]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#plesk-18077</link><guid isPermaLink="false">164f486590d88f3321944dfc11b295bb</guid><pubDate>Tue, 31 Mar 2026 00:00:00 GMT</pubDate><product>plesk</product><version>18.0.77</version><release>18.0</release><update>77</update><latest>true</latest></item><item><title><![CDATA[Keychain for API Secret Keys 2.1.0]]></title><description><![CDATA[-   [*] Introduced permission for Restricted Mode. (EXTPLESK-9623)]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#secret-keys-manager-2.1.0</link><guid isPermaLink="false">5f5bb2e50a6379188a5e3ff2672bc24b</guid><pubDate>Tue, 31 Mar 2026 00:00:00 GMT</pubDate><product>secret-keys-manager</product><version>2.1.0</version></item><item><title><![CDATA[Advisor 1.9.18]]></title><description><![CDATA[-   [!] Advisor 1.9.18 will be the last Advisor update that supports Plesk versions older than Plesk 18.0.53. To continue receiving Advisor updates with bugfixes and new features, please update your Plesk installation to version 18.0.53 or higher.
-   [*] Security improvements.]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#advisor-1.9.18</link><guid isPermaLink="false">2d698ba051b5919a19795e0f99f1b111</guid><pubDate>Tue, 31 Mar 2026 00:00:00 GMT</pubDate><product>advisor</product><version>1.9.18</version></item><item><title><![CDATA[Advisor 1.10.14]]></title><description><![CDATA[-   [*] Security improvements.]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#advisor-1.10.14</link><guid isPermaLink="false">9f50a392db059e1cc0f69a1c14bfe3ab</guid><pubDate>Tue, 31 Mar 2026 00:00:00 GMT</pubDate><product>advisor</product><version>1.10.14</version></item><item><title><![CDATA[Repair Kit 1.4.6]]></title><description><![CDATA[-   [*] Internal improvements.]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#repair-kit-1.4.6</link><guid isPermaLink="false">6857cebc614d663a37d7e6150da49aa0</guid><pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate><product>repair-kit</product><version>1.4.6</version></item><item><title><![CDATA[Plesk Migrator 2.32.1]]></title><description><![CDATA[-  [*] Show the original error message when execution of an SQL query on the source server fails. (PMT-5649)
-  [*] Show the original error message when restoration of a Plesk extension fails. (PMT-5640)
-  [-] Fixed the removal of temporary files on Plesk source servers. (PMT-5659)
-  [-] Fixed migration from DirectAdmin servers running Debian 13. (PMT-5658)
-  [-] Under certain circumstances, database migrations no longer fail with the error: "Access denied for user 'admin'@'127.0.0.1' (using password: YES)." (PMT-5657)
-  [-] Migration of Mailman 3 mailing lists no longer fails with the "python: command not found" error. (PMT-5661)
-  [-] Migration of PostgreSQL databases no longer fails with the "relation does not exist" error. (PMT-5660)]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#plesk-migrator-2.32.1</link><guid isPermaLink="false">b4d65cd825b8b4d89003ad1ff2baef54</guid><pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate><product>plesk-migrator</product><version>2.32.1</version></item><item><title><![CDATA[Panel.ini Editor 3.2.13]]></title><description><![CDATA[-   [+] Added ability to copy selected options to the OS clipboard. (EXTPLESK-436)]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#panel-ini-editor-3.2.13</link><guid isPermaLink="false">285b21b08748b8acdbf45c68167686c2</guid><pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate><product>panel-ini-editor</product><version>3.2.13</version></item><item><title><![CDATA[Nextcloud 1.7.3]]></title><description><![CDATA[-   [*] Security improvements.]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#nextcloud-1.7.3</link><guid isPermaLink="false">921c72caf7d4af737e5ea5137dda4a67</guid><pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate><product>nextcloud</product><version>1.7.3</version></item><item><title><![CDATA[Docker 2.1.9]]></title><description><![CDATA[-   [-] Fixed the issue where it was not possible to log in to Portainer after backup restore or migration. (EXTPLESK-9007)]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#docker-2.1.9</link><guid isPermaLink="false">c1e1a125aecfe16b3642c5dc20a603e3</guid><pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate><product>docker</product><version>2.1.9</version></item><item><title><![CDATA[DigitalOcean DNS 1.4.11]]></title><description><![CDATA[-   [*] Security improvements]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#digitalocean-dns-1.4.11</link><guid isPermaLink="false">16b89d393e720fd4f107a9a58569bac6</guid><pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate><product>digitalocean-dns</product><version>1.4.11</version></item><item><title><![CDATA[Advisor 1.10.13]]></title><description><![CDATA[-   [*] Improved accessibility of the extension widget.]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#advisor-1.10.13</link><guid isPermaLink="false">7573896c9325acbc20e560272e8bdbab</guid><pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate><product>advisor</product><version>1.10.13</version></item><item><title><![CDATA[SSL It! 1.21.0]]></title><description><![CDATA[-   [*] Removed the email address setting from the Let's Encrypt certificate issuance forms and the command-line arguments. (EXTPLESK-12506)]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#ssl-it-1.21.0</link><guid isPermaLink="false">90810d21d4514d62f1adab7b16e6c18c</guid><pubDate>Thu, 26 Mar 2026 00:00:00 GMT</pubDate><product>ssl-it</product><version>1.21.0</version></item><item><title><![CDATA[ACME SSL 1.0.0]]></title><description><![CDATA[-   [+] Initial release.]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#ssl-it-1.0.0</link><guid isPermaLink="false">49f16b212a6beb0da89e655934fcd83b</guid><pubDate>Thu, 26 Mar 2026 00:00:00 GMT</pubDate><product>ssl-it</product><version>1.0.0</version></item><item><title><![CDATA[Plesk Obsidian 18.0.76 Update 4]]></title><description><![CDATA[### Changes in Third-Party Components

#### Linux

-   [-] Updated Roundcube 1.4.15 to backport security fixes from 1.5.14
-   [*] Updated Roundcube to version 1.6.14]]></description><link>https://docs.plesk.com/release-notes/obsidian/change-log/#plesk-18076-mu4</link><guid isPermaLink="false">5dea06e550aa507833e6bec2ebfff927</guid><pubDate>Wed, 25 Mar 2026 00:00:00 GMT</pubDate><product>plesk</product><version>18.0.76</version><release>18.0</release><update>76</update><fix>4</fix><latest>false</latest></item></channel></rss>