Release Notes
4.13 Release Notes
Contact Center - Patch Release Notes - Version 4.13.45
8 min
release details release date 16th jan 2026 summary this patch release introduces significant enhancements to system stability, security, and user experience key updates include a new framework for critical admin alerts to prevent accidental data loss, configurable ivr visibility for smoother transfers, and native noise suppression for webrtc calls additionally, this release addresses specific ui/ux behaviors regarding search pagination and connection stability during system sleep modes highlights enhanced admin safety implementation of mandatory confirmation alerts for high impact actions (e g , deletions) optimized call transfers new configuration options to control "default ivr" visibility during transfers audio quality improvements introduction of backend controlled noise suppression for gwt webrtc security hardening updates to content security policy (csp) and cis benchmark assessments build versions key versions included in this release are component build url ameyo server ameyo server 4 13 609 20260115 r 259515 linux gtk x86 64 rpm ameyo art ameyo art 4 13 99 20260115 r 259495 linux gtk x86 64 rpm note release marked in bold has the change only, other releases has no change and are same delivered in last patch cycle, thus listed in the previous release articles features & enhancements control default ivr visibility in call transfers (/app) (en 246) change agents no longer see default ivr option by default during transfers—prevents wrong selections new control adddefaultivrfeaturecontextsforcampaign flag in server preference store default behavior shows for inbound campaigns unless disabled setup options cc level affects all campaigns in the contact center campaign level targets specific campaigns only (overrides cc level) impact only changes the ivr dropdown list transfers and routing unchanged documentation https //exotel atlassian net/wiki/spaces/arch/pages/1038712881/configurable+default+ivr+in+transfer+context (internal) note not implemented in toolbar ( https //exotel atlassian net/browse/en 906 ) mandatory warnings for critical admin actions (en 143) new protection all high impact admin actions now trigger irreversible impact warnings with required confirmation—checked in both ui and backend platform wide framework reusable alerts + full audit logging for every critical action covered actions process delete process table definition modify campaign delete user delete email media profile delete table definition delete routing rule delete/modify/inactive routing policy delete no accidental deletions—safer admin experience auto noise suppression in gwt webrtc sdk (en 290) feature lightweight noise cancellation automatically reduces background noise in calls how it works enabled by default via backend flag disablewebrtcnoisesuppression (set to false in server preference store at contact center level) no ui changes or webrtc issues safe fallback if unsupported pilot tests confirm cleaner audio toggle off via flag if needed security fixes fixed csp misconfiguration (object src vulnerability) (ga 15260) security fix (infosec) csp header updated post patch upgrade resolution changed object src 'self' to object src 'none'—no active vulnerabilities remain scan "issues" are now just informational recommendations (optional hardening) validated compliant via standard csp tools secure configuration confirmed and resolved documentation https //exotel atlassian net/wiki/spaces/ 7120207e55c94736a4446db52bb4ef909437ac/pages/edit v2/1587412993?draftshareid=67588fd1 2552 46ed bc49 5890a2988d49 (internal) cis hardening for 4x base os (ga 133) a cis benchmark compliance assessment was conducted on a rocky linux 8 system deployed using a minimal os image the objective of this assessment was to establish a baseline compliance status prior to full cis hardening and remediation benchmark comparison was performed against previously validated environments cimb setup rocky cis report cimb html porter setup porter cis report html the identified non compliant controls are documented and tracked in the cis benchmark sheet – rocky8 , which serves as the official remediation tracking artifact all findings are under review, and remediation actions are planned to align the system with cis benchmark requirements bug fixes system common bugs na voice na toolbar na fusion(ic, chat, social media) na vla na monitoring data and reports na video cc na mobile apps na si apps na media na ui/ux bugs fixed call id search across all pages (sl 17831) issue when supervisors searched call records using a call id, the results were shown correctly on the first page however, when moving to the next page, some matching records were missing fix the search value is now correctly passed for all pages supervisors can now see all matching call records across pages when searching by call id supervisors see complete results—no more missing calls on later pages fixed auto preview dial after agent break (dca20260105728410) (sl 17915) issue an issue was observed in auto preview dial where, after completing a call and moving the agent to break, the next call attempt could fail when the agent became available again and clicked the call button this happened due to a temporary mismatch in the ui, which caused the system to attempt dialing an incorrect number for the previewed customer fix the ui handling has been improved to ensure the correct previewed customer details are always used when initiating a call this ensures a smooth and reliable calling experience when agents move between available and break states during auto preview dial fixed sleep mode state glitch (dca20251112704300) (sl 17751) issue in certain scenarios, when a user’s system enters sleep mode (commonly on windows), the network may be temporarily suspended by the operating system this can cause the real time push connection to break while the application is still open fix to maintain session stability and prevent inconsistent application states, the system includes enhanced handling for such scenarios wake from sleep → back to normal operations instantly browser and platform compatibility chrome version version 143 0 7499 170 (official build) (arm64) contact support for issues or queries, please contact exotel contact center support via the support portal or through designated email channels
Have a question?
Our knowledgeable support team and an awesome community will get you an answer in a flash.
To ask a question or participate in discussions, you'll need to authenticate first.