Release Notes {#rn-general}
===========================

These release notes cover all releases to the production server for the week ending May 15, 2026.

Announcements {#rn-announce}
============================

These announcements are for May 15, 2026.

TLS Updates {#tls-1-3}
======================

We are making changes to our implementation of Transport Layer Security (TLS).

TLS 1.3
-------

To maintain the highest security standards for both browser-based and server-to-server connections, we will enable TLS 1.3 on the endpoints listed below. This enhancement is optional and will supplement the existing TLS 1.2 support, which will remain in place.  
We will make changes to these endpoints on these dates:  
**Testing environment**: May 26, 2026  
*ics2wstesta.ic3.com*  
*ics2wstest.ic3.com*  
*apitest.cybersource.com*  
**Production environment**: June 2, 2026  
*ics2wsa.ic3.com*  
*ics2ws.ic3.com*  
*api.cybersource.com*  
*api.in.cybersource.com*  
*ics2ws.in.ic3.com*  
Contact Customer Support if you have any questions about these changes.

TLS Certificate Lifetime Reduction
----------------------------------

In alignment with new CA/Browser Forum regulations, the maximum TLS certificate lifetime will be reduced gradually as follows:  
• Currently, the maximum lifetime for a TLS certificate is 200 days.  
• Beginning March 15, 2027, the maximum lifetime for a TLS certificate will be 100 days.  
• Beginning March 15, 2029, the maximum lifetime for a TLS certificate will be 47 days.  
See this blog for more information about the TLS certificate lifetime changes:  
[tls-certificate-lifetimes-will-officially-reduce-to-47-days](https://www.digicert.com/blog/tls-certificate-lifetimes-will-officially-reduce-to-47-days "")  
**How will this change impact connectivity?**  
Server-level (leaf) SSL/TLS certificates will remain valid until their scheduled expiration. Server-level (leaf) TLS certificates have shorter lifespans and must be reissued more frequently. We therefore recommend that clients trust the root certificate instead.  
**What is our recommendation?**  
We continue to recommend trusting the Root TLS certificates for all secure endpoints. This approach removes the need for periodic renewal of server level certificates and helps prevent connection failures caused by expired leaf certificates.  
**How can I tell which TLS certificate I am using?**  
Contact your server administrator or your network support team.  
**Where can I find the TLS Root certificate?**  
Continue trusting the root certificate to maintain connectivity with supported endpoints. You can download the root certificate from this article:  
[?code=KA-09802](https://support.visaacceptance.com/knowledgebase/Knowledgearticle/?code=KA-09802 "")  
Contact your Customer Support representatives with any questions.

Webhooks Updates {#webhooks-validations-decommission}
=====================================================

Webhooks version 1 will be decommissioned by end of the year 2026. See [Webhooks version 2 in the Developer Center](https://developer.cybersource.com/api-reference-assets/index.md#webhooks "").

Enhanced Webhook URL Review and Approval Process {#webhooks-urls}
=================================================================

We are introducing an enhancement to webhook subscription processing to improve security, compliance, and visibility for webhook-related URLs. Webhook URLs will be validated and reviewed before they can be used. This includes both newly submitted subscriptions and existing subscriptions currently on file. This change is expected to take place at the end of May 2026.

**What is Changing** {#webhooks-urls_section_dnx_jdt_1jc}
---------------------------------------------------------

When a webhook subscription is created or updated, the URLs associated with that subscription will be evaluated through a validation and approval process.  
This applies to:

* **Webhook URL** (required)
* **OAuth URL** (if applicable)
* **Health Check URL** (if applicable)

{#webhooks-urls_ul_enx_jdt_1jc}  
As part of this enhancement, clients might now see the following user-facing statuses:

* **PENDING_REVIEW**
* **BLOCKED**

{#webhooks-urls_ul_fnx_jdt_1jc}  
The existing **INACTIVE** status remains unchanged and continues to indicate that the subscription is approved and ready within the current lifecycle.

Status Descriptions
-------------------

|     **Status**     |                                                            **Description**                                                             |
|--------------------|----------------------------------------------------------------------------------------------------------------------------------------|
| **PENDING_REVIEW** | One or more submitted URLs are being validated or awaiting required security approval.                                                 |
| **BLOCKED**        | One or more URLs were rejected or identified as unsafe or non-compliant. The subscription cannot proceed until the URL(s) are updated. |
| **INACTIVE**       | All required approvals are complete, and the subscription is ready under the existing activation flow.                                 |

**How the New Process Works** {#webhooks-urls_section_hnx_jdt_1jc}
------------------------------------------------------------------

1. A webhook subscription is created or updated.
2. Submitted URLs are checked against existing approval records.
3. New or unknown URLs are evaluated through automated validation.
4. If additional review is required, the subscription status changes to **PENDING_REVIEW**.
5. If any URL is rejected or blocked, the subscription status changes to **BLOCKED**.
6. If all required URLs are approved, the subscription status changes to **INACTIVE**.
   {#webhooks-urls_ol_inx_jdt_1jc}

**Impact on Existing Subscriptions** {#webhooks-urls_section_jnx_jdt_1jc}
-------------------------------------------------------------------------

After this change goes live, we will run existing webhook subscriptions through the new validation process:

* Existing subscription URLs will be assessed using the new validation framework.
* URLs that require additional security review might change the status of the subscription to **PENDING_REVIEW**.
* If any existing URL is identified as blocked, the associated subscription status will be updated to **BLOCKED**.

{#webhooks-urls_ul_knx_jdt_1jc}  
In cases where a subscription status is change to **BLOCKED**, clients will be expected to perform these tasks:

* Review the affected endpoint(s).
* Update the URL(s) to an acceptable endpoint.
* Resubmit the subscription for processing.
  {#webhooks-urls_ul_lnx_jdt_1jc}

**For New Subscriptions** {#webhooks-urls_section_mnx_jdt_1jc}
--------------------------------------------------------------

New webhook-related URLs may go through validation and, if necessary, security review before the subscription can proceed.

**For Existing Subscriptions** {#webhooks-urls_section_nnx_jdt_1jc}
-------------------------------------------------------------------

Current subscriptions will also be reviewed after they go live. If an existing endpoint does not meet the new validation requirements, the subscription status might be updated to **BLOCKED** until the URL is corrected.

**If Your Subscription Is Marked BLOCKED** {#webhooks-urls_section_onx_jdt_1jc}
-------------------------------------------------------------------------------

This means one or more URLs associated with the subscription cannot be used in their current form. To continue, the client must update the affected URL(s) and resubmit.

**Why We Are Making this Change** {#webhooks-urls_section_pnx_jdt_1jc}
----------------------------------------------------------------------

This enhancement is designed to:

* **Reduce security risk** by preventing outbound calls to unapproved endpoints.
* **Improve compliance** through stronger review and approval controls.
* **Increase transparency** with clearer client-visible statuses.
* **Support scale** through a standardized and repeatable validation process.
  {#webhooks-urls_ul_qnx_jdt_1jc}

Message-Level Encryption Upcoming Mandate {#announcement-mle}
=============================================================

An updated version of message-level encryption (MLE) will become mandatory in order for merchants to use the APIs. Portfolio owners must enable this updated version of MLE for their merchants by **September 2026**.  
This required MLE update encrypts all data in your API response messages. The previous version of MLE encrypted only request messages. If your merchants are already using custom JSON Web Token messaging, they must also update how their system constructs JWTs. Merchants who are using HTTP signature messaging must migrate their system to JWT messaging.

> You risk transaction failures if you do not implement this MLE update.

Overview of MLE
---------------

MLE is a robust security protocol designed to encrypt individual messages or payloads at the application layer. By protecting sensitive data at the message level, MLE ensures that your information remains secure as it moves through systems and networks, providing a layer of security beyond traditional transport encryption.  
Enabling MLE requires you to create a REST API key for request messages and a *REST -- API Response MLE* key for response messages. If your organization is using a meta key, the portfolio account or merchant account user who created the meta key must also create the REST -- API Response MLE key.

Update Methods
:
* Create or update your custom MLE integration using JWTs with P12 certificates. For more information, see the [Enable Message-Level Encryption](https://developer.cybersource.com/docs/cybs/en-us/platform/developer/all/rest/rest-getting-started/restgs-jwt-message-intro/restgs-mle-intro.md "") section in the *Getting Started with REST Developer Guide*. For a method using shared secret key pairs, see the HTTP Messaging Migration to JWT Messaging section below.
* Update your REST API SDK. For more information, see the *REST API related products* section in the [Cybersource GitHub](https://github.com/CyberSource "").

JSON Web Token Construction Update
----------------------------------

There are new requirements for how to construct JSON Web Tokens (JWTs) in order to send API request messages. If you use a custom integration to construct JWTs, you must update your system to remain compliant. This update is necessary to support the new MLE requirements.

Update Methods
:
* See [Construct JWT Messages Using a P12 Certificate](https://developer.cybersource.com/docs/cybs/en-us/platform/developer/all/rest/rest-getting-started/restgs-jwt-message-intro/restgs-jwt-const-intro.md "") in the *Getting Started with REST Developer Guide*
* See [Construct JWT Messages Using a Shared Secret Key Pair](https://developer.cybersource.com/docs/cybs/en-us/platform/developer/all/rest/rest-getting-started/restgs-jwt-shared-secret-intro/restgs-jwt-con-shared-secret-intro.md "") in the *Getting Started with REST Developer Guide*

HTTP Messaging Migration to JWT Messaging
-----------------------------------------

By **September 2026** , all merchants using HTTP signature messaging must migrate to JWT messaging in order to support MLE. Merchants already using HTTP signature messaging with shared secret key pairs can now continue using their existing keys with JWT messaging.

Update Method
:
See [Construct JWT Messages Using a Shared Secret Key Pair](https://developer.cybersource.com/docs/cybs/en-us/platform/developer/all/rest/rest-getting-started/restgs-jwt-shared-secret-intro.md "") in the *Getting Started with REST Developer Guide*

Smart Auth Retirement {#smart-auth-eol-33440}
=============================================

Smart Auth, also known as SuperAuth, is being discontinued. This product was often included in the Essentials package of products for small merchants.  
Support for Smart Auth is being discontinued in phases. The final end of life occurs October 5, 2026.
Merchants currently using Smart Auth will receive a 90-day product sunset notification.  
Merchants interested in a similar product can use Fraud Management Essentials (FME). FME is an actively supported service that offers improved fraud protection capabilities and system reliability.

Features Introduced This Week {#rn-features}
============================================

**Partner Risk Controls (PaRC)** \| RM-43752
--------------------------------------------

Description
:
This release introduces new ECI (e-commerce indicator) controls in PaRC for e-commerce transactions, where the PaRC user can place rejected transactions in the new ECIs coming from the authentication.

Mandate
:
Does not apply.

Audience
:
Users of PaRC.

Benefit
:
Improved protection from unauthenticated transactions and blocking e-commerce transactions to prevent fraudulent merchants from performing riskier transactions.

Technical Details
:
The New ECIs are:

    * 07 (Data-only for VISA).
    * 04 and 06 (Data share program for Mastercard).
    * N0 and N2 for Mastercard (Non-financial transaction).
    {#rn-features_ul_w24_jgj_gjc}

Important Dates
:
Released to production May 13, 2026.

Fixed Issues {#rn-fixed-issues}
===============================

**Offline Transaction File Submission** \| RM-45170
---------------------------------------------------

Description
:
This release fixes an issue that prevented links between credit transaction IDs and parent debit transaction IDs after execution of the scheduled completion job.

Audience
:
Merchants who use the FNBO/FNBOACH eCheck processor/gateway.

Technical Details
:
Searching for a debit request ID after a transaction is marked as *Completed* now accurately shows the parent debit and child credit transaction IDs on the same search result.

Important Dates
:
Released to production May 13, 2026.

**Settlement** \| RM-44760
--------------------------

Description
:
This release fixes an issue which caused incorrectly populated capture-sequence/count fields (pos 84/86) in settlement files for airline merchants, violating Worldpay requirements.

Audience
:
Airline merchants who use Worldpay.

Technical Details
:
None.

Important Dates
:
Released to production May 13, 2026.

**Business Center** \| RM-45474
-------------------------------

Description
:
This release resolves two bugs: one related to the page jumping to the top after each keystroke or click when re-entering credit card numbers, and another involving incorrect transaction amounts displayed on email receipts.

Audience
:
Global.

Technical Details
:
None.

Important Dates
:
Released to production May 13, 2026.

Known Issues {#rn-known-issues}
===============================

**Response Code** \| EPS-37597
------------------------------

Description
:
The Worldpay response code 149 (*The transaction is not permitted, or the card is not available for use* ) is incorrectly mapped to Cybersource response code 211 (*Invalid CVN*).

Audience
:
Merchants who use Worldpay.

Technical Details
:
None.

Workaround
:
None.

**Apple Pay** \| EPS-37644
--------------------------

Description
:
When an Apple Pay transaction is submitted through Worldpay and the customer's name in their Apple Wallet contains multi-byte UTF-8 characters, for example, Chinese, the transaction fails.

Audience
:
Users of Apple Pay and Worldpay.

Technical Details
:
The merchant receives the error Reason Code 233 (INVALID_FIELD_MAX_LENGTH).

Workaround
:
None.

**Notifications** \| EPS-37659
------------------------------

Description
:
Several types of notifications are not being delivered to some accounts in our testing environment, including:

    * Email
    * Webhooks
    * Invoicing
    * Pay by Link
    {#rn-known-issues_ul_mnj_cqj_gjc}

Audience
:
Global.

Workaround
:
None.
