Home

Description

Sentry is an error tracking and performance monitoring tool. From version 21.12.0 to before version 26.4.1, a critical vulnerability was discovered in the SAML SSO implementation of Sentry. The vulnerability allows an attacker to take over any user account by using a malicious SAML Identity Provider and another organization on the same Sentry instance. The victim email address must be known in order to exploit this vulnerability. This issue has been patched in version 26.4.1.

PUBLISHED Reserved 2026-04-26 | Published 2026-05-08 | Updated 2026-05-08 | Assigner GitHub_M




CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-290: Authentication Bypass by Spoofing

Product status

>= 21.12.0, < 26.4.1
affected

References

github.com/...sentry/security/advisories/GHSA-rcmw-7mc7-3rj7

github.com/getsentry/sentry/pull/113720

github.com/...ommit/0c67558ae7fe08738912d4c5233b53ead048da3b

github.com/getsentry/sentry/releases/tag/26.4.1

cve.org (CVE-2026-42354)

nvd.nist.gov (CVE-2026-42354)

Download JSON