CVSS 3.1 Score 5.5 of 10 (medium)


Published Jul 18, 2023
Updated: May 17, 2024


CVE-2020-36762 is a critical vulnerability found in ONS Digital RAS Collection Instrument up to version 2.0.27. The vulnerability allows for OS command injection through the manipulation of the $COMMENT_BODY argument in the jobs function of the .github/workflows/comment.yml file. Upgrading to version 2.0.28 and applying patch dcaad2540f7d50c512ff2e031d3778dd9337db2b can address this issue. The vulnerability has a risk score of 66 and a base severity rating of MEDIUM, with a CVSS score of 5.5. It affects multiple products within the sI_3t3 to sI_3uL range. The potential danger it poses to an organization includes partial confidentiality, integrity, and availability impacts, with low privileges required for exploitation and no user interaction needed.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2020-36762 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options