Lyrie
Vulnerability
0 sources verified·5 min read
By Lyrie Threat Intelligence·5/9/2026

The SSO Backdoor Nobody's Patched Yet: Sentry SAML Flaw Lets Attackers Own Any User

TL;DR

Sentry's SAML SSO implementation has a critical authentication bypass (CVE-2026-42354, CVSS 9.1) that allows attackers to fully take over any user account on multi-organization instances. A malicious actor with access to one organization's SSO settings can hijack accounts across the entire Sentry instance. Self-hosted Sentry deployments with multiple organizations enabled are vulnerable; Sentry.io SaaS was patched in April, but self-hosted users must upgrade to 26.4.1 immediately.

What Happened

On May 8, 2026, Sentry disclosed a critical authentication bypass in its SAML SSO implementation (CVE-2026-42354). The vulnerability exists in Sentry versions 21.12.0 through 26.4.0 and was reported via the company's private bug bounty program.

The flaw permits an attacker to completely take over any user account on a Sentry instance by:

1. Gaining access to modify SSO settings for a different organization on the same Sentry deployment

2. Creating a malicious SAML Identity Provider

3. Linking the victim's email address to that malicious IdP

4. Assuming the victim's account without authentication

The vulnerability only affects multi-organization deployments (where SENTRY_SINGLE_ORGANIZATION = False), which is the default for self-hosted instances. Sentry.io SaaS users were patched automatically in early April; self-hosted customers remain at risk unless they've upgraded.

Technical Details

Attack Vector

The vulnerability stems from improper authentication in Sentry's SAML SSO process. When a user first authenticates via SAML, Sentry links the authenticated SAML identity to the user's email address. The flaw occurs when this linking process doesn't properly validate which organization's SSO configuration is being used.

Exploitation requirements:

  • The attacker must have existing access to one organization within the Sentry instance
  • The attacker must have permissions to modify SSO settings for that organization
  • The target user's email address must be known
  • The victim's account must be on a different organization (not the attacker's)

Attack chain:

1. Attacker gains access to Org A (either as a legitimate user or via compromised credentials)

2. Attacker modifies Org A's SAML SSO settings or creates a new malicious IdP

3. Attacker crafts a SAML response claiming to authenticate as [email protected]

4. Victim (or attacker impersonating them) accesses Sentry and is redirected to Org A's SAML IdP

5. The malicious IdP returns a valid SAML assertion for [email protected]

6. Sentry links this SAML identity to the victim's account across the entire instance

7. Attacker now controls the victim's account

Impact Radius

This is a privilege escalation multiplier:

  • If the victim is an admin, attacker gains admin access to all organizations
  • If the victim has API keys, the attacker inherits those credentials
  • If the victim has access to sensitive projects (e.g., production monitoring), those become compromised
  • Error tracking data, performance metrics, and deployment logs become exposed

For organizations using Sentry as the central error log for their application stack (which most do), account takeover = visibility into production incidents, environment variables in error traces, and complete observability data.

Affected Versions

  • Vulnerable: Sentry 21.12.0 through 26.4.0
  • Fixed: Sentry 26.4.1 and later
  • Sentry.io SaaS: Patched in April 2026 (users not at risk)
  • Self-Hosted: Vulnerable unless upgraded

Workaround

The only reliable workaround is user-level two-factor authentication (2FA). Organizations can mitigate by requiring all users to enable 2FA on their Sentry accounts via Account Settings > Security > Two-Factor Authentication. This prevents account takeover even if credentials are compromised, as the attacker cannot complete the 2FA challenge.

However, 2FA is opt-in, not enforced by default, and Sentry organization admins cannot force it on users—only recommend it.

Lyrie Assessment

This vulnerability hits at the intersection of identity attack surface expansion and observability infrastructure risk—two areas critical to Lyrie's defensive model.

Why CISOs Should Care

1. Observability as a Prized Attack Target

Sentry and similar error-tracking platforms are honeypots for attackers. They collect:

  • Unhandled exceptions (often containing PII, API keys, internal hostnames)
  • Stack traces (revealing architecture, library versions, internal code structure)
  • Environment variables in error context
  • Deployment details and service relationships

An attacker who compromises a Sentry admin account has complete visibility into the organization's application stack—better reconnaissance than any port scan.

2. Multi-Org Deployment Blindspot

Many enterprises use a single Sentry instance across multiple business units or product teams for cost efficiency. A compromised account in one org becomes a bridgehead into others. The attacker doesn't need to breach each org separately; SSO provides lateral movement for free.

3. 2FA Isn't Enough (and Shouldn't Be Your Bet)

The recommended workaround (user-level 2FA) only works if users actually enable it. Most don't. Organization-wide 2FA enforcement would require a platform-level feature that Sentry hasn't built. Relying on a patch-specific workaround is not a security posture.

4. Patching Lag in Self-Hosted Deployments

Self-hosted Sentry customers typically update slowly. Versions 21.12.0 through 26.4.0 span nearly 5 years—organizations running even moderately old instances are vulnerable. Given how critical observability is to production defense, this is a non-starter.

Autonomous Defense Angle

From Lyrie's perspective, this is a non-human identity (NHI) attack surface. Sentry API keys (often embedded in CI/CD pipelines, logging sidecars, or collector agents) are "machines" that speak to Sentry. If a user account is compromised, those API keys may be exposed. Lyrie would flag:

  • Unexpected new SAML IdP configurations in Sentry
  • Lateral account activity across organizations
  • Bulk reads of error data from accounts that normally don't access certain projects

Recommendation for Multi-Org Deployments

If you run self-hosted Sentry with multiple organizations, treat this as a priority-1 upgrade. This is not a "check next quarter" vulnerability—it's a bridge into your entire observability stack.

Recommended Actions

For Sentry.io SaaS Users:

  • ✅ No action required (patched in April)
  • Optional: Enable 2FA on your account for defense-in-depth

For Self-Hosted Sentry Users:

  • Immediate: Upgrade to Sentry 26.4.1 or later
  • If single-organization deployment (SENTRY_SINGLE_ORGANIZATION = True): No vulnerability, but upgrade is still recommended
  • If multi-organization deployment: Assume active exploitation risk; prioritize this upgrade
  • During patching: Require all org admins to enable 2FA as a temporary control
  • Post-patch: Audit SAML IdP configurations across all organizations for suspicious entries

For DevOps Teams:

  • Review Sentry API key rotation policies
  • Audit error logs for unusual SAML authentication events (new IdP registrations, cross-org authentication attempts)
  • If using Sentry for production logs, assume any error data visible before your patch date is potentially exposed

Sources

1. GitHub Security Advisory GHSA-rcmw-7mc7-3rj7 – Sentry SAML SSO Account Takeover

2. TheHackerWire: CVE-2026-42354 Critical Vulnerability

3. Sentry Release 26.4.1

4. Sentry PR #113720 – Fix SAML SSO Account Linking


Lyrie.ai Cyber Research Division

Lyrie Verdict

Lyrie's autonomous defense layer flags this class of exposure the moment it surfaces — no signature update required.