Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

getsentry — Vulnerabilities & Security Advisories 24

Browse all 24 CVE security advisories affecting getsentry. AI-powered Chinese analysis, POCs, and references for each vulnerability.

getsentry operates as an error tracking and performance monitoring platform, primarily serving developers to identify and resolve bugs in real-time applications. Its architecture, which involves complex web interfaces and extensive API integrations, has historically exposed it to diverse vulnerability classes. Recorded Common Vulnerabilities and Exposures (CVEs) frequently highlight issues such as Cross-Site Scripting (XSS), insecure direct object references, and potential Remote Code Execution (RCE) vectors within its web application layer. Additionally, privilege escalation flaws have been documented, allowing unauthorized users to access sensitive data or administrative functions. These security gaps often stem from complex dependency management and intricate permission models inherent in its multi-tenant SaaS environment. While no single catastrophic breach has defined its public history, the cumulative effect of these 23 CVEs underscores the challenges of maintaining security in a rapidly evolving, feature-rich developer tool. Continuous patching and rigorous code auditing remain critical for mitigating these persistent risks.

Found 17 results / 24Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2026-42354 Sentry: Improper authentication on SAML SSO process allows user identity linking — sentryCWE-290 9.1 Critical2026-05-08
CVE-2026-26004 Sentry allows unauthorized access to event data across organizational boundaries — sentryCWE-639 4.3 -2026-03-17
CVE-2026-27197 Sentry: Improper Authentication on SAML SSO process allows user identity linking — sentryCWE-287 9.1 Critical2026-02-21
CVE-2025-53099 Sentry Missing Invalidation of Authorization Codes During OAuth Exchange and Revocation — sentryCWE-288 7.4AIHighAI2025-07-01
CVE-2025-22146 Improper authentication on SAML SSO process allows user impersonation in sentry — sentryCWE-287 9.1 Critical2025-01-15
CVE-2024-53253 Sentry's improper error handling leaks Application Integration Client Secret — sentryCWE-209 5.3 Medium2024-11-22
CVE-2024-45605 Improper authorization on deletion of user issue alert notifications in sentry — sentryCWE-639 6.5 Medium2024-09-17
CVE-2024-45606 Improper authorization on muting of alert rules in sentry — sentryCWE-639 7.1 High2024-09-17
CVE-2024-41656 Sentry vulnerable to stored Cross-Site Scripting (XSS) — sentryCWE-79 7.1 High2024-07-23
CVE-2024-35196 Slack integration leaks sensitive information in logs in Sentry — sentryCWE-532 2.0 Low2024-05-31
CVE-2024-32474 Sentry's superuser cleartext password leaked in logs — sentryCWE-312 7.3 High2024-04-18
CVE-2024-24829 SSRF in Sentry via Phabricator integration — sentryCWE-918 4.3 Medium2024-02-08
CVE-2023-39531 Sentry vulnerable to incorrect credential validation on OAuth token requests — sentryCWE-287 6.5 Medium2023-08-09
CVE-2023-39349 Sentry vulnerable to privilege escalation via ApiTokensEndpoint — sentryCWE-284 8.1 High2023-08-07
CVE-2023-36826 Sentry vulnerable to improper authorization on debug and artifact file downloads — sentryCWE-285 7.7 High2023-07-25
CVE-2023-36829 Sentry CORS misconfiguration vulnerability — sentryCWE-942 6.8 Medium2023-07-06
CVE-2022-23485 Invite code reuse via cookie manipulation in sentry — sentryCWE-269 6.4 Medium2022-12-10

This page lists every published CVE security advisory associated with getsentry. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.