INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Multiple sectors HIGH 55m Global vulnerability Government and Critical Infrastructure CRITICAL 1h Global vulnerability Multiple sectors CRITICAL 1h Global apt Financial Services, Government HIGH 1h Global insider Cross-sector CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global vulnerability Information Technology / Software Infrastructure CRITICAL 2h Global data_breach Healthcare CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software Development HIGH 3h Global data_breach Multiple sectors HIGH 55m Global vulnerability Government and Critical Infrastructure CRITICAL 1h Global vulnerability Multiple sectors CRITICAL 1h Global apt Financial Services, Government HIGH 1h Global insider Cross-sector CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global vulnerability Information Technology / Software Infrastructure CRITICAL 2h Global data_breach Healthcare CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software Development HIGH 3h Global data_breach Multiple sectors HIGH 55m Global vulnerability Government and Critical Infrastructure CRITICAL 1h Global vulnerability Multiple sectors CRITICAL 1h Global apt Financial Services, Government HIGH 1h Global insider Cross-sector CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global vulnerability Information Technology / Software Infrastructure CRITICAL 2h Global data_breach Healthcare CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software Development HIGH 3h
Vulnerabilities

CVE-2020-35730

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability — Roundcube Webmail contains a cross-site scripting (XSS) vulnerability that allows an attacker to send a plain text e-mail message with Java
Published: Jun 22, 2023  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability — Roundcube Webmail contains a cross-site scripting (XSS) vulnerability that allows an attacker to send a plain text e-mail message with Javascript in a link reference element that is mishandled by linkref_addinindex in rcube_string_replacer.php.

🤖 AI Executive Summary

Roundcube Webmail contains a critical stored XSS vulnerability (CVSS 9.0) in email link handling that allows attackers to inject malicious JavaScript through crafted email messages. When victims open affected emails, the injected script executes in their browser context, potentially compromising email accounts and sensitive data. This vulnerability affects all organizations using Roundcube for webmail services and poses immediate risk given public exploit availability.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 19, 2026 09:36
🇸🇦 Saudi Arabia Impact Assessment
Saudi government entities, financial institutions, and enterprises relying on Roundcube webmail face critical risk. Banking sector (SAMA-regulated institutions) could experience unauthorized access to customer communications and financial data. Government agencies (NCA oversight) may suffer data breaches affecting classified communications. Healthcare organizations could lose patient confidentiality. Telecommunications providers (STC, Mobily) and energy sector (ARAMCO) using Roundcube face operational disruption and espionage risks. Educational institutions and large enterprises using Roundcube are equally vulnerable to account takeover and data exfiltration.
🏢 Affected Saudi Sectors
Banking and Financial Services Government and Public Administration Healthcare Energy and Utilities Telecommunications Education Large Enterprises
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all Roundcube installations in your environment and document versions
2. Disable Roundcube webmail access temporarily if patching cannot be completed within 24 hours
3. Review email logs for suspicious link patterns or JavaScript injection attempts
4. Alert users not to click links in emails from untrusted sources

PATCHING:
1. Update Roundcube to version 1.4.9 or later (1.3.x users update to 1.3.15)
2. Apply patches to rcube_string_replacer.php linkref_addinindex function
3. Test patches in staging environment before production deployment
4. Restart webmail services after patching

COMPENSATING CONTROLS (if immediate patching impossible):
1. Implement Web Application Firewall (WAF) rules to block JavaScript in email link references
2. Enable Content Security Policy (CSP) headers to restrict script execution
3. Disable HTML email rendering, enforce plain text only
4. Implement email gateway filtering for suspicious link patterns

DETECTION:
1. Monitor rcube_string_replacer.php for error logs indicating XSS attempts
2. Search email logs for patterns: javascript:, onerror=, onclick= in link href attributes
3. Monitor user sessions for unusual activity post-email opening
4. Enable Roundcube debug logging to capture malicious payloads
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع تثبيتات Roundcube في بيئتك وتوثيق الإصدارات
2. تعطيل وصول Roundcube مؤقتاً إذا لم يتمكن من إكمال التصحيح في غضون 24 ساعة
3. مراجعة سجلات البريد الإلكتروني للأنماط المريبة أو محاولات حقن JavaScript
4. تنبيه المستخدمين بعدم النقر على الروابط في رسائل البريد من مصادر غير موثوقة

التصحيح:
1. تحديث Roundcube إلى الإصدار 1.4.9 أو أحدث (مستخدمو 1.3.x يحدثون إلى 1.3.15)
2. تطبيق التصحيحات على وظيفة linkref_addinindex في rcube_string_replacer.php
3. اختبار التصحيحات في بيئة التجريب قبل نشر الإنتاج
4. إعادة تشغيل خدمات البريد الإلكتروني بعد التصحيح

الضوابط البديلة (إذا كان التصحيح الفوري مستحيلاً):
1. تنفيذ قواعد جدار حماية تطبيقات الويب (WAF) لحظر JavaScript في مراجع روابط البريد
2. تفعيل رؤوس سياسة أمان المحتوى (CSP) لتقييد تنفيذ البرامج النصية
3. تعطيل عرض البريد الإلكتروني بصيغة HTML، فرض النص العادي فقط
4. تنفيذ تصفية بوابة البريد الإلكتروني للأنماط المريبة

الكشف:
1. مراقبة rcube_string_replacer.php لسجلات الأخطاء التي تشير إلى محاولات XSS
2. البحث في سجلات البريد عن الأنماط: javascript:, onerror=, onclick= في سمات href للروابط
3. مراقبة جلسات المستخدم للنشاط غير المعتاد بعد فتح البريد
4. تفعيل تسجيل تصحيح أخطاء Roundcube لالتقاط الحمولات الضارة
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
A.14.2.1 - Secure development policy and procedures A.14.2.5 - Secure development environment A.12.6.1 - Management of technical vulnerabilities A.12.2.1 - Monitoring of information systems
🔵 SAMA CSF
ID.BE-5 - Organizational resilience PR.DS-6 - Data is protected from unauthorized access DE.CM-1 - The network is monitored to detect potential cybersecurity events RS.MI-1 - Incidents are contained
🟡 ISO 27001:2022
A.12.6.1 - Management of technical vulnerabilities A.14.2.1 - Secure development policy A.14.2.5 - Secure development environment A.12.2.1 - Information systems monitoring
🟣 PCI DSS v4.0
6.2 - Ensure all system components are protected from known vulnerabilities 6.5.7 - Cross-site scripting (XSS) prevention 11.2 - Run automated vulnerability scanning tools
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Roundcube:Roundcube Webmail
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS64.81%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2023-07-13
Published 2023-06-22
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.