Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65944: CWE-201: Insertion of Sensitive Information Into Sent Data in getsentry sentry-javascript

0
Medium
VulnerabilityCVE-2025-65944cvecve-2025-65944cwe-201
Published: Tue Nov 25 2025 (11/25/2025, 00:23:53 UTC)
Source: CVE Database V5
Vendor/Project: getsentry
Product: sentry-javascript

Description

Sentry-Javascript is an official Sentry SDKs for JavaScript. From version 10.11.0 to before 10.27.0, when a Node.js application using the Sentry SDK has sendDefaultPii: true it is possible to inadvertently send certain sensitive HTTP headers, including the Cookie header, to Sentry. Those headers would be stored within a Sentry organization as part of the associated trace. A person with access to the Sentry organization could then view and use these sensitive values to impersonate or escalate their privileges within the application. This issue has been patched in version 10.27.0.

AI-Powered Analysis

AILast updated: 11/25/2025, 00:51:49 UTC

Technical Analysis

CVE-2025-65944 affects the Sentry-Javascript SDK, specifically versions from 10.11.0 up to but not including 10.27.0. The vulnerability arises when the sendDefaultPii configuration option is set to true in Node.js applications using this SDK. Under these conditions, certain sensitive HTTP headers, including the Cookie header, are unintentionally included in the telemetry data sent to Sentry's backend. This data is then stored within the Sentry organization’s project traces. Since cookies often contain session tokens or authentication credentials, their exposure can lead to impersonation or privilege escalation attacks if an attacker gains access to the Sentry organization. The vulnerability is classified under CWE-201, which involves the insertion of sensitive information into sent data. Exploitation requires that the attacker already has high privileges within the Sentry organization (e.g., a user with access to view traces). No user interaction is required, and the vulnerability does not affect confidentiality or integrity of the application directly but compromises sensitive telemetry data confidentiality. The issue was patched in version 10.27.0 by preventing sensitive headers from being sent when sendDefaultPii is enabled. There are no known exploits in the wild as of the publication date. The CVSS 4.0 base score is 5.1 (medium severity), reflecting network attack vector, low attack complexity, partial privileges required, no user interaction, and limited scope impact.

Potential Impact

For European organizations, this vulnerability poses a risk of sensitive data leakage through telemetry data collected by Sentry. Organizations that use the affected versions of the Sentry-Javascript SDK with sendDefaultPii enabled may inadvertently expose HTTP headers containing session cookies or other sensitive tokens. If an attacker or malicious insider gains access to the Sentry organization, they could extract these sensitive values to impersonate users or escalate privileges within the application environment. This can lead to unauthorized access to internal systems or data breaches. The impact is particularly significant for organizations with large development teams or third-party collaborators who have access to Sentry projects, increasing the risk of insider threats or accidental exposure. Additionally, organizations subject to strict data protection regulations such as GDPR may face compliance risks due to the unauthorized exposure of personal data. However, since exploitation requires existing high privileges within Sentry, the vulnerability primarily escalates risk rather than enabling initial compromise.

Mitigation Recommendations

European organizations should immediately upgrade all instances of the Sentry-Javascript SDK to version 10.27.0 or later to ensure the vulnerability is patched. Until the upgrade is completed, organizations should consider disabling the sendDefaultPii option to prevent sensitive headers from being sent. Review and restrict access permissions within Sentry organizations to limit the number of users with high privileges capable of viewing sensitive telemetry data. Implement strict access controls and audit logging for Sentry usage to detect any unauthorized access or data exfiltration attempts. Conduct a thorough review of telemetry data stored in Sentry to identify and remove any sensitive information that may have been inadvertently collected. Educate development and security teams about the risks of enabling sendDefaultPii and the importance of minimizing sensitive data exposure in telemetry. Finally, integrate vulnerability management processes to monitor for updates and advisories related to Sentry and other SDKs used in development.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-18T16:14:56.691Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6924fa182a08b12b0e78427a

Added to database: 11/25/2025, 12:36:40 AM

Last enriched: 11/25/2025, 12:51:49 AM

Last updated: 11/25/2025, 1:48:03 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats