Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27197: CWE-287: Improper Authentication in getsentry sentry

0
Critical
VulnerabilityCVE-2026-27197cvecve-2026-27197cwe-287
Published: Sat Feb 21 2026 (02/21/2026, 04:35:14 UTC)
Source: CVE Database V5
Vendor/Project: getsentry
Product: sentry

Description

CVE-2026-27197 is a critical improper authentication vulnerability in the SAML SSO implementation of Sentry versions 21. 12. 0 through 26. 1. 0. It allows attackers to take over any user account by leveraging a malicious SAML Identity Provider and exploiting multi-organization configurations within the same Sentry instance. Self-hosted users are at risk only if multiple organizations are configured or if a malicious user can modify SSO settings for another organization. The vulnerability has a CVSS score of 9. 1, indicating high severity with no user interaction or privileges required. The issue was fixed in version 26.

AI-Powered Analysis

AILast updated: 02/21/2026, 05:16:34 UTC

Technical Analysis

CVE-2026-27197 is a critical vulnerability classified under CWE-287 (Improper Authentication) affecting the SAML Single Sign-On (SSO) implementation in Sentry, a widely used developer error tracking and performance monitoring tool. The flaw exists in versions 21.12.0 through 26.1.0 and allows an attacker to impersonate any user account by exploiting the trust relationship between Sentry and a malicious SAML Identity Provider (IdP). Specifically, in multi-organization Sentry instances, an attacker controlling a malicious IdP for one organization can manipulate authentication flows to gain access to accounts in another organization hosted on the same instance. For self-hosted deployments, the risk applies only if multiple organizations are configured (SENTRY_SINGLE_ORGANIZATION set to True) or if an attacker already has permissions to modify SSO settings for other organizations. The vulnerability requires no prior privileges or user interaction, making it highly exploitable remotely. The impact includes full compromise of user accounts, leading to unauthorized access to sensitive error logs, performance data, and potentially further lateral movement within the affected environment. The vendor addressed this issue in version 26.2.0. As a temporary mitigation, enabling user account-based two-factor authentication (2FA) can prevent attackers from completing authentication even if they exploit the SAML flaw. However, 2FA must be enabled by individual users, as organization administrators cannot enforce it on their behalf. No known exploits are currently reported in the wild, but the critical nature and ease of exploitation warrant immediate attention.

Potential Impact

The vulnerability poses a severe risk to organizations using Sentry, especially those with multi-organization instances or self-hosted deployments configured for multiple organizations. Successful exploitation allows attackers to fully compromise user accounts without needing credentials or user interaction, threatening confidentiality and integrity of sensitive application error data and performance metrics. This can lead to unauthorized disclosure of proprietary or personal information, manipulation or deletion of error tracking data, and potential pivoting to other internal systems. The lack of required privileges and user interaction significantly increases the attack surface and likelihood of exploitation. Organizations relying on Sentry for monitoring critical applications may face operational disruptions, data breaches, and loss of trust from customers and stakeholders. The vulnerability's critical severity (CVSS 9.1) reflects its potential to cause widespread damage if left unpatched.

Mitigation Recommendations

1. Immediately upgrade all affected Sentry instances to version 26.2.0 or later, where the vulnerability is fixed. 2. For self-hosted environments, review and adjust the SENTRY_SINGLE_ORGANIZATION setting to limit multi-organization configurations where feasible. 3. Enforce user account-based two-factor authentication (2FA) across all user accounts to add an additional layer of security; educate users on enabling 2FA since administrators cannot enforce it on their behalf. 4. Audit and restrict permissions related to SSO settings modification to trusted personnel only, minimizing risk of malicious configuration changes. 5. Monitor authentication logs for unusual SAML IdP activities or login attempts from unrecognized providers. 6. Consider isolating organizations on separate Sentry instances to reduce cross-organization attack vectors. 7. Regularly review and update SAML IdP configurations to ensure only trusted providers are authorized. 8. Implement network segmentation and access controls to limit exposure of Sentry management interfaces. 9. Stay informed on any emerging exploits or patches related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-18T19:47:02.154Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69993c53be58cf853b46cc30

Added to database: 2/21/2026, 5:02:11 AM

Last enriched: 2/21/2026, 5:16:34 AM

Last updated: 2/21/2026, 7:03:27 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats