CVE-2026-42354

Sentry · Sentry

Sentry's SAML SSO implementation is vulnerable to an account takeover flaw when using a malicious SAML Identity Provider.

Executive summary

A critical vulnerability in Sentry's SAML SSO implementation allows attackers to take over user accounts by exploiting cross-organization trust.

Vulnerability

The SAML SSO logic fails to properly isolate organizations, allowing a malicious SAML Identity Provider to impersonate users from another organization on the same instance.

Business impact

With a CVSS score of 9.1, this allows attackers to gain unauthorized access to sensitive Sentry data, including API keys and performance metrics. This is a severe threat to the confidentiality of organizational data stored within Sentry.

Remediation

Immediate Action: Update Sentry to version 26.4.1 or later immediately.

Proactive Monitoring: Audit SAML configuration and review logs for suspicious SSO login events, particularly those involving multiple organizations.

Compensating Controls: If immediate patching is not possible, temporarily disable SAML SSO and enforce strong multi-factor authentication for all users.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Account takeover vulnerabilities in SSO providers are high-impact events. Organizations should prioritize this update to ensure the integrity of their identity and access management.