{"api_version":"1","generated_at":"2026-05-09T11:18:52+00:00","cve":"CVE-2026-42354","urls":{"html":"https://cve.report/CVE-2026-42354","api":"https://cve.report/api/cve/CVE-2026-42354.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-42354","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-42354"},"summary":{"title":"Sentry: Improper authentication on SAML SSO process allows user identity linking","description":"Sentry is an error tracking and performance monitoring tool. From version 21.12.0 to before version 26.4.1, a critical vulnerability was discovered in the SAML SSO implementation of Sentry. The vulnerability allows an attacker to take over any user account by using a malicious SAML Identity Provider and another organization on the same Sentry instance. The victim email address must be known in order to exploit this vulnerability. This issue has been patched in version 26.4.1.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-05-08 23:16:38","updated_at":"2026-05-08 23:16:38"},"problem_types":["CWE-290","CWE-290 CWE-290: Authentication Bypass by Spoofing"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"9.1","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"9.1","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/getsentry/sentry/commit/0c67558ae7fe08738912d4c5233b53ead048da3b","name":"https://github.com/getsentry/sentry/commit/0c67558ae7fe08738912d4c5233b53ead048da3b","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/getsentry/sentry/security/advisories/GHSA-rcmw-7mc7-3rj7","name":"https://github.com/getsentry/sentry/security/advisories/GHSA-rcmw-7mc7-3rj7","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/getsentry/sentry/releases/tag/26.4.1","name":"https://github.com/getsentry/sentry/releases/tag/26.4.1","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/getsentry/sentry/pull/113720","name":"https://github.com/getsentry/sentry/pull/113720","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-42354","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42354","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"getsentry","product":"sentry","version":"affected >= 21.12.0, < 26.4.1","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"sentry","vendor":"getsentry","versions":[{"status":"affected","version":">= 21.12.0, < 26.4.1"}]}],"descriptions":[{"lang":"en","value":"Sentry is an error tracking and performance monitoring tool. From version 21.12.0 to before version 26.4.1, a critical vulnerability was discovered in the SAML SSO implementation of Sentry. The vulnerability allows an attacker to take over any user account by using a malicious SAML Identity Provider and another organization on the same Sentry instance. The victim email address must be known in order to exploit this vulnerability. This issue has been patched in version 26.4.1."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-290","description":"CWE-290: Authentication Bypass by Spoofing","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-08T22:58:33.659Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/getsentry/sentry/security/advisories/GHSA-rcmw-7mc7-3rj7","tags":["x_refsource_CONFIRM"],"url":"https://github.com/getsentry/sentry/security/advisories/GHSA-rcmw-7mc7-3rj7"},{"name":"https://github.com/getsentry/sentry/pull/113720","tags":["x_refsource_MISC"],"url":"https://github.com/getsentry/sentry/pull/113720"},{"name":"https://github.com/getsentry/sentry/commit/0c67558ae7fe08738912d4c5233b53ead048da3b","tags":["x_refsource_MISC"],"url":"https://github.com/getsentry/sentry/commit/0c67558ae7fe08738912d4c5233b53ead048da3b"},{"name":"https://github.com/getsentry/sentry/releases/tag/26.4.1","tags":["x_refsource_MISC"],"url":"https://github.com/getsentry/sentry/releases/tag/26.4.1"}],"source":{"advisory":"GHSA-rcmw-7mc7-3rj7","discovery":"UNKNOWN"},"title":"Sentry: Improper authentication on SAML SSO process allows user identity linking"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-42354","datePublished":"2026-05-08T22:58:33.659Z","dateReserved":"2026-04-26T13:26:14.515Z","dateUpdated":"2026-05-08T22:58:33.659Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-08 23:16:38","lastModifiedDate":"2026-05-08 23:16:38","problem_types":["CWE-290","CWE-290 CWE-290: Authentication Bypass by Spoofing"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":5.2}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"42354","Ordinal":"1","Title":"Sentry: Improper authentication on SAML SSO process allows user ","CVE":"CVE-2026-42354","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"42354","Ordinal":"1","NoteData":"Sentry is an error tracking and performance monitoring tool. From version 21.12.0 to before version 26.4.1, a critical vulnerability was discovered in the SAML SSO implementation of Sentry. The vulnerability allows an attacker to take over any user account by using a malicious SAML Identity Provider and another organization on the same Sentry instance. The victim email address must be known in order to exploit this vulnerability. This issue has been patched in version 26.4.1.","Type":"Description","Title":"Sentry: Improper authentication on SAML SSO process allows user "}]}}}