
CVE-2025-22146 – Improper authentication on SAML SSO process allows user impersonation in sentry
https://notcve.org/view.php?id=CVE-2025-22146
15 Jan 2025 — Sentry is a developer-first error tracking and performance monitoring tool. A critical vulnerability was discovered in the SAML SSO implementation of Sentry. It was reported to us via our private bug bounty program. The vulnerability allows an attacker to take over any user account by using a malicious SAML Identity Provider and another organization on the same Sentry instance. The victim email address must be known in order to exploit this vulnerability. • https://github.com/getsentry/sentry/pull/83407 • CWE-287: Improper Authentication •

CVE-2024-45605 – Improper authorization on deletion of user issue alert notifications in sentry
https://notcve.org/view.php?id=CVE-2024-45605
17 Sep 2024 — Sentry is a developer-first error tracking and performance monitoring platform. An authenticated user delete the user issue alert notifications for arbitrary users given a know alert ID. A patch was issued to ensure authorization checks are properly scoped on requests to delete user alert notifications. Sentry SaaS users do not need to take any action. Self-Hosted Sentry users should upgrade to version 24.9.0 or higher. • https://github.com/getsentry/self-hosted • CWE-639: Authorization Bypass Through User-Controlled Key •

CVE-2024-45606 – Improper authorization on muting of alert rules in sentry
https://notcve.org/view.php?id=CVE-2024-45606
17 Sep 2024 — Sentry is a developer-first error tracking and performance monitoring platform. An authenticated user can mute alert rules from arbitrary organizations and projects with a know rule ID. The user does not need to be a member of the organization or have permissions on the project. In our review, we have identified no instances where alerts have been muted by unauthorized parties. A patch was issued to ensure authorization checks are properly scoped on requests to mute alert rules. • https://github.com/getsentry/self-hosted • CWE-639: Authorization Bypass Through User-Controlled Key •

CVE-2024-41656 – Sentry vulnerable to stored Cross-Site Scripting (XSS)
https://notcve.org/view.php?id=CVE-2024-41656
23 Jul 2024 — Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 24.7.1, an unsanitized payload sent by an Integration platform integration allows storing arbitrary HTML tags on the Sentry side with the subsequent rendering them on the Issues page. Self-hosted Sentry users may be impacted in case of untrustworthy Integration platform integrations sending external issues from their side to Sentry. A patch has been released in Sentry 24.7.1. For Sentry SaaS cust... • https://github.com/getsentry/self-hosted/releases/tag/24.7.1 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-35196 – Slack integration leaks sensitive information in logs in Sentry
https://notcve.org/view.php?id=CVE-2024-35196
31 May 2024 — Sentry is a developer-first error tracking and performance monitoring platform. Sentry's Slack integration incorrectly records the incoming request body in logs. This request data can contain sensitive information, including the deprecated Slack verification token. With this verification token, it is possible under specific configurations, an attacker can forge requests and act as the Slack integration. The request body is leaked in log entries matching `event == "slack.*" && name == "sentry.integrations.sl... • https://api.slack.com/authentication/verifying-requests-from-slack#app-management-updates • CWE-532: Insertion of Sensitive Information into Log File •

CVE-2024-32474 – Sentry's superuser cleartext password leaked in logs
https://notcve.org/view.php?id=CVE-2024-32474
18 Apr 2024 — Sentry is an error tracking and performance monitoring platform. Prior to 24.4.1, when authenticating as a superuser to Sentry with a username and password, the password is leaked as cleartext in logs under the _event_: `auth-index.validate_superuser`. An attacker with access to the log data could use these leaked credentials to login to the Sentry system as superuser. Self-hosted users on affected versions should upgrade to 24.4.1 or later. Users can configure the logging level to exclude logs of the `INFO... • https://github.com/getsentry/sentry/commit/d5b34568d9f1c41362ccb62141532a0a2169512f • CWE-117: Improper Output Neutralization for Logs CWE-312: Cleartext Storage of Sensitive Information •

CVE-2024-24829 – SSRF in Sentry via Phabricator integration
https://notcve.org/view.php?id=CVE-2024-24829
08 Feb 2024 — Sentry is an error tracking and performance monitoring platform. Sentry’s integration platform provides a way for external services to interact with Sentry. One of such integrations, the Phabricator integration (maintained by Sentry) with version <=24.1.1 contains a constrained SSRF vulnerability. An attacker could make Sentry send POST HTTP requests to arbitrary URLs (including internal IP addresses) by providing an unsanitized input to the Phabricator integration. However, the body payload is constrained ... • https://github.com/getsentry/self-hosted/releases/tag/24.1.2 • CWE-918: Server-Side Request Forgery (SSRF) •

CVE-2023-39531 – Sentry vulnerable to incorrect credential validation on OAuth token requests
https://notcve.org/view.php?id=CVE-2023-39531
09 Aug 2023 — Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 23.7.2, an attacker with sufficient client-side exploits could retrieve a valid access token for another user during the OAuth token exchange due to incorrect credential validation. The client ID must be known and the API application must have already been authorized on the targeted user account. Sentry SaaS customers do not need to take any action. Self-hosted installations should upgrade to ver... • https://github.com/getsentry/sentry/security/advisories/GHSA-hgj4-h2x3-rfx4 • CWE-287: Improper Authentication •

CVE-2023-39349 – Sentry vulnerable to privilege escalation via ApiTokensEndpoint
https://notcve.org/view.php?id=CVE-2023-39349
07 Aug 2023 — Sentry is an error tracking and performance monitoring platform. Starting in version 22.1.0 and prior to version 23.7.2, an attacker with access to a token with few or no scopes can query `/api/0/api-tokens/` for a list of all tokens created by a user, including tokens with greater scopes, and use those tokens in other requests. There is no evidence that the issue was exploited on `sentry.io`. For self-hosted users, it is advised to rotate user auth tokens. A fix is available in version 23.7.2 of `sentry` a... • https://github.com/getsentry/self-hosted/releases/tag/23.7.2 • CWE-284: Improper Access Control CWE-287: Improper Authentication •

CVE-2023-36826 – Sentry vulnerable to improper authorization on debug and artifact file downloads
https://notcve.org/view.php?id=CVE-2023-36826
25 Jul 2023 — Sentry is an error tracking and performance monitoring platform. Starting in version 8.21.0 and prior to version 23.5.2, an authenticated user can download a debug or artifact bundle from arbitrary organizations and projects with a known bundle ID. The user does not need to be a member of the organization or have permissions on the project. A patch was issued in version 23.5.2 to ensure authorization checks are properly scoped on requests to retrieve debug or artifact bundles. Authenticated users who do not... • https://github.com/getsentry/sentry/commit/e932b15435bf36239431eaa3790a6bcfa47046a9 • CWE-285: Improper Authorization CWE-863: Incorrect Authorization •