Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 11 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 10 May 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sentry 8.2.0 contains a remote code execution vulnerability that allows authenticated superusers to execute arbitrary commands by injecting malicious pickle-serialized objects through the audit log entry data parameter. Attackers can submit crafted POST requests to the admin audit log endpoint with base64-encoded compressed pickle payloads in the data field to achieve code execution with application privileges. | |
| Title | Sentry 8.2.0 Remote Code Execution via Pickle Deserialization | |
| First Time appeared |
Sentry
Sentry sentry |
|
| Weaknesses | CWE-94 | |
| CPEs | cpe:2.3:a:sentry:sentry:8.2.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Sentry
Sentry sentry |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-11T14:44:21.054Z
Reserved: 2026-02-01T11:24:18.717Z
Link: CVE-2021-47935
Updated: 2026-05-11T14:44:16.062Z
Status : Analyzed
Published: 2026-05-10T13:16:29.693
Modified: 2026-05-14T17:16:03.740
Link: CVE-2021-47935
No data.
OpenCVE Enrichment
Updated: 2026-05-10T15:45:14Z