๐Ÿ” CVE Alert

CVE-2021-47935

HIGH 8.8

Sentry 8.2.0 Remote Code Execution via Pickle Deserialization

CVSS Score
8.8
EPSS Score
0.3%
EPSS Percentile
49th

Sentry 8.2.0 contains a remote code execution vulnerability that allows authenticated superusers to execute arbitrary commands by injecting malicious pickle-serialized objects through the audit log entry data parameter. Attackers can submit crafted POST requests to the admin audit log endpoint with base64-encoded compressed pickle payloads in the data field to achieve code execution with application privileges.

CWE CWE-94
Vendor sentry
Product sentry
Published May 10, 2026
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for sentry sentry

Be the first to know when new high vulnerabilities affecting sentry sentry are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Sentry / Sentry
8.2.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
exploit-db.com: https://www.exploit-db.com/exploits/50318 sentry.io: https://sentry.io/welcome/ vulncheck.com: https://www.vulncheck.com/advisories/sentry-remote-code-execution-via-pickle-deserialization

Credits

Mohin Paramasivam (Shad0wQu35t)