SAML SSO Vulnerability in Sentry Developer Tools
CVE-2026-27197

9.1CRITICAL

Key Information:

Vendor

Getsentry

Status
Vendor
CVE Published:
21 February 2026

What is CVE-2026-27197?

The Sentry developer tool faces a SAML SSO vulnerability that can allow attackers to gain control over user accounts by leveraging a malicious SAML Identity Provider in a multi-organization instance. This risk is particularly relevant for self-hosted instances configured with multiple organizations, where a user with modified SSO permissions may inadvertently empower an attacker. To mitigate this vulnerability, users are encouraged to enable two-factor authentication on their accounts, as it cannot be activated by organization administrators on behalf of users.

Affected Version(s)

sentry >= 21.12.0, < 26.2.0

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.