A recently patched vulnerability in popular error tracking and performance monitoring platform Sentry could have allowed attackers to hijack user accounts.
The critical vulnerability, tracked as CVE-2025-22146 and assigned a CVSS score of 9.1, was discovered in Sentry’s Security Assertion Markup Language (SAML) single sign-on (SSO) implementation. Exploitation of this flaw could have allowed malicious actors to impersonate any user on a shared Sentry instance.
“A critical vulnerability was discovered in the SAML SSO implementation of Sentry. It was reported to us via our private bug bounty program,” reads the security advisory.
The vulnerability stemmed from improper authentication within the SAML SSO process. By utilizing a malicious SAML Identity Provider and targeting an organization residing on the same Sentry instance, an attacker could have taken over any user account within that organization, provided they knew the victim’s email address.
Sentry has addressed the vulnerability with the release of version 25.1.0. Users of self-hosted Sentry instances are urged to upgrade to this version or later to mitigate the risk. Sentry SaaS users are already protected, as the fix was deployed on January 14, 2025.
SAML SSO, while designed to simplify user access, can introduce security risks if not implemented correctly. Organizations utilizing SAML SSO should ensure their implementations adhere to security best practices and are regularly audited for vulnerabilities.