CVE-2025-53099: CWE-288: Authentication Bypass Using an Alternate Path or Channel in getsentry sentry
Sentry is a developer-first error tracking and performance monitoring tool. Prior to version 25.5.0, an attacker with a malicious OAuth application registered with Sentry can take advantage of a race condition and improper handling of authorization code within Sentry to maintain persistence to a user's account. With a specially timed requests and redirect flows, an attacker could generate multiple authorization codes that could be used to exchange for access and refresh tokens. This was possible even after de-authorizing the particular application. This issue has been patched in version 25.5.0. Self-hosted Sentry users should upgrade to version 25.5.0 or higher. Sentry SaaS users do not need to take any action.
CVE-2025-53099: CWE-288: Authentication Bypass Using an Alternate Path or Channel in getsentry sentry
Description
Sentry is a developer-first error tracking and performance monitoring tool. Prior to version 25.5.0, an attacker with a malicious OAuth application registered with Sentry can take advantage of a race condition and improper handling of authorization code within Sentry to maintain persistence to a user's account. With a specially timed requests and redirect flows, an attacker could generate multiple authorization codes that could be used to exchange for access and refresh tokens. This was possible even after de-authorizing the particular application. This issue has been patched in version 25.5.0. Self-hosted Sentry users should upgrade to version 25.5.0 or higher. Sentry SaaS users do not need to take any action.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-25T13:41:23.086Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6863fa286f40f0eb728fdb3d
Added to database: 7/1/2025, 3:09:28 PM
Last updated: 7/1/2025, 3:09:28 PM
Views: 1
Related Threats
CVE-2025-34064: CWE-668 Exposure of Resource to Wrong Sphere in One Identity OneLogin Active Directory Connector (ADC)
CriticalCVE-2025-34063: CWE-290 Authentication Bypass by Spoofing in One Identity OneLogin Active Directory Connector (ADC)
CriticalCVE-2025-34062: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in One Identity OneLogin Active Directory Connector (ADC)
MediumCVE-2025-6958: SQL Injection in Campcodes Employee Management System
MediumCVE-2025-6957: SQL Injection in Campcodes Employee Management System
MediumActions
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.