CVE-2020-36911
Severity CVSS v4.0:
CRITICAL
Type:
CWE-798
Use of Hard-coded Credentials
Publication date:
13/01/2026
Last modified:
29/01/2026
Description
Covenant 0.1.3 - 0.5 contains a remote code execution vulnerability that allows attackers to craft malicious JWT tokens with administrative privileges. Attackers can generate forged tokens with admin roles and upload custom DLL payloads to execute arbitrary commands on the target system.
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cobbr:covenant:*:*:*:*:*:*:*:* | 0.1.3 (including) | 0.5 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://cobbr.io/Covenant.html
- https://github.com/Zeop-CyberSec/covenant_rce/blob/master/covenant_jwt_rce.rb
- https://github.com/cobbr/Covenant
- https://web.archive.org/web/20201013165001/https://twitter.com/cobbr_io/status/1316058367161401344
- https://web.archive.org/web/20201101052547/https://blog.null.farm/hunting-the-hunters
- https://www.exploit-db.com/exploits/51141
- https://www.vulncheck.com/advisories/covenant-remote-code-execution-rce
- https://github.com/Zeop-CyberSec/covenant_rce/blob/master/covenant_jwt_rce.rb
- https://web.archive.org/web/20201101052547/https://blog.null.farm/hunting-the-hunters



