PT-2026-39510 · Sentry · Sentry

Mohin Paramasivam

·

Published

2026-05-10

·

Updated

2026-05-10

·

CVE-2021-47935

CVSS v3.1

8.8

High

VectorAV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Sentry 8.2.0 contains a remote code execution vulnerability that allows authenticated superusers to execute arbitrary commands by injecting malicious pickle-serialized objects through the audit log entry data parameter. Attackers can submit crafted POST requests to the admin audit log endpoint with base64-encoded compressed pickle payloads in the data field to achieve code execution with application privileges.

Exploit

Fix

Code Injection

Weakness Enumeration

Related Identifiers

CVE-2021-47935

Affected Products

Sentry