Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27197: CWE-287: Improper Authentication in getsentry sentry

0
Critical
VulnerabilityCVE-2026-27197cvecve-2026-27197cwe-287
Published: Sat Feb 21 2026 (02/21/2026, 04:35:14 UTC)
Source: CVE Database V5
Vendor/Project: getsentry
Product: sentry

Description

Sentry is a developer-first error tracking and performance monitoring tool. Versions 21.12.0 through 26.1.0 have a critical vulnerability in its SAML SSO implementation which allows an attacker to take over any user account by using a malicious SAML Identity Provider and another organization on the same Sentry instance. Self-hosted users are only at risk if the following criteria is met: ore than one organizations are configured (SENTRY_SINGLE_ORGANIZATION = True), or malicious user has existing access and permissions to modify SSO settings for another organization in a multo-organization instance. This issue has been fixed in version 26.2.0. To workaround this issue, implement user account-based two-factor authentication to prevent an attacker from being able to complete authentication with a victim's user account. Organization administrators cannot do this on a user's behalf, this requires individual users to ensure 2FA has been enabled for their account.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 12:38:37 UTC

Technical Analysis

CVE-2026-27197 is a critical security vulnerability classified under CWE-287 (Improper Authentication) affecting the SAML Single Sign-On (SSO) implementation in the Sentry error tracking and performance monitoring tool. Specifically, versions from 21.12.0 up to but not including 26.2.0 are vulnerable. The flaw arises in multi-organization self-hosted Sentry instances where multiple organizations share the same Sentry installation. An attacker who controls a malicious SAML Identity Provider (IdP) and has access to at least one organization on the instance can exploit this vulnerability to impersonate any user across other organizations within the same Sentry instance. This is possible because the SAML SSO implementation does not properly validate or isolate authentication tokens between organizations, allowing cross-organization account takeover. The vulnerability requires no user interaction or prior authentication privileges, making it highly exploitable remotely over the network. The vulnerability was addressed in Sentry version 26.2.0 by fixing the SAML SSO logic to properly segregate authentication contexts between organizations. As a temporary mitigation, enabling user account-based two-factor authentication (2FA) can prevent attackers from completing authentication even if they can forge SAML assertions. However, 2FA must be enabled individually by users, as organization administrators cannot enforce it on their behalf. There are no known exploits in the wild at the time of publication, but the high CVSS score of 9.1 reflects the critical nature of the vulnerability due to its ease of exploitation and severe impact on confidentiality and integrity.

Potential Impact

The impact of CVE-2026-27197 is severe for organizations using self-hosted Sentry instances with multiple organizations configured. An attacker exploiting this vulnerability can fully compromise user accounts across organizations, gaining unauthorized access to sensitive error logs, performance data, and potentially other integrated systems. This can lead to exposure of confidential application data, intellectual property, and user information. The attacker can also manipulate or delete error reports, undermining the integrity of monitoring and incident response processes. Since Sentry is widely used by development teams globally, a successful attack could disrupt software development lifecycles and incident management. The vulnerability does not affect single-organization setups unless specific conditions are met, limiting the scope somewhat. However, organizations with multi-tenant Sentry deployments or those allowing users to modify SSO settings are at significant risk. The lack of required user interaction and the ability to exploit remotely increase the threat level. The compromise of user accounts could also facilitate lateral movement within affected organizations’ infrastructure, amplifying the overall damage.

Mitigation Recommendations

To mitigate CVE-2026-27197, organizations should immediately upgrade all affected Sentry instances to version 26.2.0 or later, where the vulnerability is patched. For environments where immediate upgrading is not feasible, enforcing user account-based two-factor authentication (2FA) is a critical interim control to prevent attackers from completing authentication even if they can forge SAML assertions. It is important to communicate to users that 2FA must be enabled individually, as administrators cannot enforce it on their behalf. Additionally, organizations should audit their Sentry configurations to ensure that multi-organization setups are strictly necessary and consider consolidating or isolating organizations to reduce attack surface. Restrict permissions to modify SSO settings to trusted administrators only and monitor for unusual SSO configuration changes. Regularly review SAML Identity Providers configured and remove any untrusted or unused IdPs. Implement network segmentation and monitoring around Sentry instances to detect anomalous authentication attempts. Finally, maintain up-to-date incident response plans that include procedures for SSO compromise scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-18T19:47:02.154Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69993c53be58cf853b46cc30

Added to database: 2/21/2026, 5:02:11 AM

Last enriched: 2/28/2026, 12:38:37 PM

Last updated: 4/7/2026, 6:31:04 AM

Views: 347

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses