CVE-2020-36911
Severity CVSS v4.0:
CRITICAL
Type:
CWE-798
Use of Hard-coded Credentials
Publication date:
13/01/2026
Last modified:
13/01/2026
Description
Covenant 0.1.3 - 0.5 contains a remote code execution vulnerability that allows attackers to craft malicious JWT tokens with administrative privileges. Attackers can generate forged tokens with admin roles and upload custom DLL payloads to execute arbitrary commands on the target system.
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
Base Score 3.x
9.80
Severity 3.x
CRITICAL
References to Advisories, Solutions, and Tools
- https://cobbr.io/Covenant.html
- https://github.com/Zeop-CyberSec/covenant_rce/blob/master/covenant_jwt_rce.rb
- https://github.com/cobbr/Covenant
- https://web.archive.org/web/20201013165001/https://twitter.com/cobbr_io/status/1316058367161401344
- https://web.archive.org/web/20201101052547/https://blog.null.farm/hunting-the-hunters
- https://www.exploit-db.com/exploits/51141
- https://www.vulncheck.com/advisories/covenant-remote-code-execution-rce



