PROBABLYPWNED
VulnerabilitiesMay 9, 20263 min read

Sentry SAML Flaw Lets Attackers Hijack Any Account—No Password Needed

CVE-2026-42354 (CVSS 9.1) allows attackers to take over any Sentry user account via malicious SAML IdP. Patch to version 26.4.1 immediately.

Marcus Chen

A critical vulnerability in Sentry's SAML SSO implementation allows attackers to hijack any user account on a shared instance without knowing the victim's password. All they need is the target's email address.

CVE-2026-42354, disclosed on May 8, 2026, carries a CVSS score of 9.1 (Critical). The flaw affects Sentry versions from 21.12.0 up to 26.4.1 and requires immediate patching for any organization running a multi-tenant Sentry deployment.

How the Attack Works

The vulnerability exists in how Sentry links SAML assertions to internal user accounts. When a user authenticates via a SAML Identity Provider, Sentry trusts the email address in the assertion and binds it to the corresponding internal account—regardless of which organization's IdP issued the assertion.

An attacker with administrative access to any organization on a shared Sentry instance can configure a malicious IdP. By crafting a SAML assertion containing a victim's email address, the attacker's IdP session gets linked to the victim's account. No user interaction or password is required from the target.

This cross-organization validation failure means that multi-tenant Sentry deployments—including self-hosted instances serving multiple teams—are particularly exposed. The attacker gains full access to the victim's error tracking data, source maps, release information, and any integrations they've configured.

Who Should Be Concerned

Organizations running self-hosted Sentry instances with multiple organizations configured are at highest risk. SaaS users on sentry.io should verify with Sentry's security team whether their instance has been patched, though cloud infrastructure is typically updated faster than on-premise deployments.

The attack requires the victim's email address to be known, but email addresses are often discoverable through public sources, corporate directories, or previous data breaches. Security teams managing authentication infrastructure should treat email addresses as effectively public information when assessing this vulnerability's impact.

Remediation Steps

  1. Upgrade immediately to Sentry version 26.4.1 or later
  2. Audit recent logins for any unusual SAML authentication events
  3. Review organization membership on multi-tenant instances for unauthorized additions
  4. Enable additional MFA where possible as defense-in-depth

Organizations that cannot immediately upgrade should consider temporarily disabling SAML SSO and falling back to username/password authentication until patching is complete.

Authentication Bypass Patterns Continue

This vulnerability follows a pattern we've seen repeatedly in 2026. Similar SAML and OAuth implementation flaws enabled the OpenCTI admin takeover last week, and authentication bypass issues have become one of the most common critical vulnerability classes this year.

The core problem is trust boundary confusion: Sentry correctly validates that a SAML assertion comes from a legitimate IdP, but fails to verify that the IdP has authority over the email address it's asserting. This same pattern appears in federated authentication systems across the industry.

For organizations evaluating error monitoring platforms, this incident underscores the importance of understanding how SSO integrations handle cross-tenant data isolation. Security teams should request architecture documentation on identity boundaries before deploying any SaaS tool with SAML support across organizational units.

Sentry has published a security advisory with full technical details and upgrade instructions.

Related Articles