Sentry 8.2.0 contains a remote code execution vulnerability that allows authenticated superusers to execute arbitrary commands by injecting malicious pickle-serialized objects through the audit log entry data parameter. Attackers can submit crafted POST requests to the admin audit log endpoint with base64-encoded compressed pickle payloads in the data field to achieve code execution with application privileges.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 10 May 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sentry 8.2.0 contains a remote code execution vulnerability that allows authenticated superusers to execute arbitrary commands by injecting malicious pickle-serialized objects through the audit log entry data parameter. Attackers can submit crafted POST requests to the admin audit log endpoint with base64-encoded compressed pickle payloads in the data field to achieve code execution with application privileges. | |
| Title | Sentry 8.2.0 Remote Code Execution via Pickle Deserialization | |
| First Time appeared |
Sentry
Sentry sentry |
|
| Weaknesses | CWE-94 | |
| CPEs | cpe:2.3:a:sentry:sentry:8.2.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Sentry
Sentry sentry |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-10T12:43:54.239Z
Reserved: 2026-02-01T11:24:18.717Z
Link: CVE-2021-47935
No data.
Status : Received
Published: 2026-05-10T13:16:29.693
Modified: 2026-05-10T13:16:29.693
Link: CVE-2021-47935
No data.
OpenCVE Enrichment
Updated: 2026-05-10T15:45:14Z
Weaknesses