INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global phishing Multiple sectors HIGH 32m Global insider Cybersecurity Services CRITICAL 41m Global ransomware Multiple sectors (U.S. companies) CRITICAL 55m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 32m Global insider Cybersecurity Services CRITICAL 41m Global ransomware Multiple sectors (U.S. companies) CRITICAL 55m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 32m Global insider Cybersecurity Services CRITICAL 41m Global ransomware Multiple sectors (U.S. companies) CRITICAL 55m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h
Vulnerabilities

CVE-2020-11023

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
JQuery Cross-Site Scripting (XSS) Vulnerability — JQuery contains a persistent cross-site scripting (XSS) vulnerability. When passing maliciously formed, untrusted input enclosed in HTML tags, JQuery'
Published: Jan 23, 2025  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

JQuery Cross-Site Scripting (XSS) Vulnerability — JQuery contains a persistent cross-site scripting (XSS) vulnerability. When passing maliciously formed, untrusted input enclosed in HTML tags, JQuery's DOM manipulators can execute untrusted code in the context of the user's browser.

🤖 AI Executive Summary

CVE-2020-11023 is a critical persistent Cross-Site Scripting (XSS) vulnerability in jQuery that allows attackers to inject and execute malicious JavaScript code within a victim's browser session. The flaw exists in jQuery's DOM manipulation methods, which fail to properly sanitize untrusted HTML input, enabling session hijacking, credential theft, and unauthorized actions on behalf of authenticated users. With a CVSS score of 9.0 and a confirmed public exploit, this vulnerability poses an immediate and severe risk to any web application leveraging affected jQuery versions. The widespread adoption of jQuery across enterprise, government, and financial web portals makes this a high-priority remediation target.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 18, 2026 04:19
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations face elevated risk due to the pervasive use of jQuery across government e-services portals (Yesser/Absher), banking and financial platforms regulated by SAMA, healthcare patient portals (MOH, SEHA), and energy sector operational dashboards (Saudi Aramco, NEOM digital infrastructure). Successful exploitation could lead to session hijacking of privileged government users, credential harvesting from banking customers, defacement of official portals, and lateral movement via stolen admin tokens. NCA-regulated entities hosting citizen-facing web applications are particularly exposed. Telecom providers (STC, Mobily, Zain) with self-service portals are also at significant risk. Given Saudi Arabia's Vision 2030 digital transformation push, the attack surface across newly deployed web applications is substantially large.
🏢 Affected Saudi Sectors
Banking Government Healthcare Energy Telecom Education Retail Transportation
⚖️ Saudi Risk Score (AI)
9.0
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Inventory all web applications and identify those using jQuery versions prior to 3.5.0.
2. Treat any externally facing application using vulnerable jQuery as critically exposed — restrict access or apply WAF rules immediately.
3. Review application logs for anomalous script injections or unexpected DOM manipulation patterns.

PATCHING GUIDANCE:
4. Upgrade jQuery to version 3.5.0 or later, which includes the fix for CVE-2020-11023.
5. If upgrading is not immediately feasible, apply the official jQuery patch or migrate to a patched fork.
6. Update all bundled or vendored jQuery copies within CMS platforms (WordPress, Drupal, SharePoint) and frameworks.

COMPENSATING CONTROLS:
7. Deploy a Web Application Firewall (WAF) with rules targeting XSS payloads — specifically blocking script injection via HTML tag attributes.
8. Implement a strict Content Security Policy (CSP) header to prevent execution of inline scripts: Content-Security-Policy: script-src 'self'.
9. Enable HTTPOnly and Secure flags on all session cookies to limit session hijacking impact.
10. Apply input validation and output encoding at the application layer for all user-supplied data.

DETECTION RULES:
11. SIEM Rule: Alert on HTTP responses containing <script> tags within user-controlled parameters.
12. Monitor for unexpected outbound connections from browser sessions (potential data exfiltration).
13. Deploy XSS-specific signatures in IDS/IPS (Snort/Suricata rules for jQuery DOM XSS patterns).
14. Enable browser-side reporting via CSP report-uri directive to capture exploitation attempts.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. جرد جميع تطبيقات الويب وتحديد تلك التي تستخدم إصدارات jQuery السابقة للإصدار 3.5.0.
2. اعتبار أي تطبيق خارجي يستخدم jQuery المتأثرة في وضع الخطر الحرج — تقييد الوصول أو تطبيق قواعد WAF فوراً.
3. مراجعة سجلات التطبيقات بحثاً عن أنماط حقن نصوص برمجية غير طبيعية أو تلاعب غير متوقع في DOM.

إرشادات التصحيح:
4. الترقية إلى jQuery الإصدار 3.5.0 أو أحدث الذي يتضمن إصلاح CVE-2020-11023.
5. إذا تعذّرت الترقية الفورية، تطبيق التصحيح الرسمي من jQuery أو الانتقال إلى نسخة مُصحَّحة.
6. تحديث جميع نسخ jQuery المضمّنة داخل منصات CMS (WordPress، Drupal، SharePoint) والأطر البرمجية.

ضوابط التعويض:
7. نشر جدار حماية تطبيقات الويب (WAF) بقواعد تستهدف حمولات XSS — وتحديداً حظر حقن النصوص البرمجية عبر سمات وسوم HTML.
8. تطبيق رأس سياسة أمان المحتوى (CSP) الصارم لمنع تنفيذ النصوص المضمّنة.
9. تفعيل علامتَي HTTPOnly وSecure على جميع ملفات تعريف الارتباط للجلسات للحد من تأثير اختطاف الجلسات.
10. تطبيق التحقق من المدخلات وترميز المخرجات على مستوى طبقة التطبيق لجميع البيانات المُدخَلة من المستخدم.

قواعد الكشف:
11. قاعدة SIEM: التنبيه على استجابات HTTP التي تحتوي على وسوم <script> ضمن المعاملات التي يتحكم فيها المستخدم.
12. مراقبة الاتصالات الصادرة غير المتوقعة من جلسات المتصفح (احتمال تسريب البيانات).
13. نشر توقيعات XSS المحددة في IDS/IPS.
14. تفعيل التقارير من جانب المتصفح عبر توجيه report-uri في CSP لرصد محاولات الاستغلال.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-2-1: Cybersecurity Risk Management ECC-3-3-3: Web Application Security ECC-3-3-6: Vulnerability Management ECC-3-3-7: Patch Management ECC-3-3-1: Network Security — WAF Controls ECC-2-5: Cybersecurity in System and Application Acquisition
🔵 SAMA CSF
3.3.6 — Vulnerability Management 3.3.7 — Patch and Change Management 3.3.3 — Web Application Security Controls 3.4.2 — Secure Development Lifecycle 3.3.1 — Network Security (WAF deployment)
🟡 ISO 27001:2022
A.8.8 — Management of Technical Vulnerabilities A.8.25 — Secure Development Life Cycle A.8.29 — Security Testing in Development and Acceptance A.8.9 — Configuration Management A.5.14 — Information Transfer (data exfiltration risk) A.8.20 — Networks Security
🟣 PCI DSS v4.0
Requirement 6.2 — Bespoke and Custom Software Security Requirement 6.3 — Security Vulnerabilities Identified and Addressed Requirement 6.4 — Public-Facing Web Applications Protected Against Attacks Requirement 11.3 — External and Internal Vulnerability Scans Requirement 12.3 — Risk Assessment Process
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
JQuery:JQuery
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS36.28%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2025-02-13
Published 2025-01-23
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.0
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.