CVE-2026-42354 - Sentry SAML SSO identity linking
Self-hosted Sentry versions 21.12.0 through 26.4.0 contain a critical SAML
SSO authentication flaw in multi-organization deployments. A malicious user who
can configure SAML SSO for one organization on the same Sentry instance can use
a malicious identity provider and a known victim email address to link into the
victim’s user account.
The highest-risk shape is a shared self-hosted Sentry installation with multiple organizations, organization-managed SAML settings, and users who do not enforce account-level two-factor authentication. Sentry SaaS was patched by the vendor; ordinary application use of Sentry SDKs is not this CVE.
Affected versions
- Vulnerable:
sentry >=21.12.0, <=26.4.0 - Fixed:
sentry >=26.4.1
Indicator-of-exposure
- The repository owns or deploys a self-hosted Sentry server, not just a Sentry SDK, DSN, or integration.
- Sentry resolves to a vulnerable
sentryPython package version or a vulnerable self-hosted Sentry release/container tag. - Multi-organization mode is enabled, such as
SENTRY_SINGLE_ORGANIZATION = False. - SAML SSO is enabled for one or more organizations, and organization owners can modify SSO identity provider configuration.
- Account-level 2FA is not required for all users.
Quick checks:
rg -n "getsentry|sentry.*self-hosted|SENTRY_SINGLE_ORGANIZATION|SAML|saml2|sso" .
rg -n "sentry==|sentry[<=>]|getsentry/sentry|self-hosted" requirements*.txt pyproject.toml poetry.lock Pipfile.lock Dockerfile* docker-compose*.yml .github deploy helm charts k8s
docker image ls | rg 'getsentry|sentry'Remediation strategy
- Upgrade self-hosted Sentry to
26.4.1+, including Python package pins, container images, Helm/chart values, compose files, and self-hosted release manifests controlled by the repository. - If the instance is intended to be single-organization only, set and verify
SENTRY_SINGLE_ORGANIZATION = Trueas a compensating exposure reduction. - Require user account-level 2FA for Sentry users, especially administrators and users in organizations with SAML SSO enabled.
- Inventory organization SAML providers and identity links after patching. If suspicious links or IdP changes are found, expire sessions and require a human-reviewed account recovery plan.
- Do not treat Sentry SDK dependency updates as remediation unless this repo actually builds or deploys the Sentry server.
The prompt
Model context: this prompt was generated by GPT 5.5 Extra High reasoning.
You are remediating CVE-2026-42354 (Sentry SAML SSO identity linking account
takeover) in this repository or deployment source. Produce exactly one output:
- A reviewer-ready PR/change request that upgrades self-hosted Sentry and
documents required operator validation, or
- TRIAGE.md if this repository does not own a self-hosted Sentry server or safe
deployment patch path.
## Rules
- Scope only CVE-2026-42354.
- Distinguish self-hosted Sentry server deployments from ordinary Sentry SDK,
DSN, logging, CI, or monitoring integrations.
- Do not change unrelated identity provider settings, organization ownership,
user emails, or account links automatically.
- Do not log SAML assertions, cookies, session tokens, IdP secrets, private
keys, DSNs, or user secrets.
- Do not auto-merge.
## Steps
1. Inventory Sentry server ownership:
- Python package pins for `sentry`;
- `getsentry/sentry` or self-hosted release images;
- Docker Compose, Helm, Kubernetes, Terraform, Ansible, or release manifests;
- internal runbooks that pin self-hosted Sentry versions.
2. If the repo only uses Sentry SDKs, DSNs, source-map uploaders, alerting
integrations, or Sentry SaaS, stop with `TRIAGE.md` explaining why this CVE
is not patchable here.
3. Determine whether any self-hosted Sentry server version resolves to
`>=21.12.0, <=26.4.0`.
4. Check exposure-relevant configuration and record it in the PR body:
- `SENTRY_SINGLE_ORGANIZATION` effective value;
- whether SAML SSO is enabled;
- whether organization owners can modify SSO provider settings;
- whether account-level 2FA is required for administrators and SAML users.
5. Upgrade every vulnerable self-hosted Sentry reference to `26.4.1+` on the
repository's normal release line. Regenerate lockfiles, image metadata,
Helm lock files, SBOMs, and deployment render output where applicable.
6. Add or update a short operator runbook section named
`CVE-2026-42354 operator checks` that requires:
- verification that the deployed Sentry version is `26.4.1+`;
- review of recent SAML IdP configuration changes across organizations;
- review of unexpected SAML identity links for privileged users;
- session expiration and account recovery steps if suspicious links exist;
- enforcement or rollout tracking for user account-level 2FA.
7. If upgrade cannot be deployed immediately, add the safest temporary
containment available in this repo, such as forcing single-organization mode
for single-tenant deployments, disabling organization-managed SAML setup
behind a feature flag, restricting Sentry admin access, or documenting an
emergency 2FA requirement.
8. Run available validation: dependency resolution, image build or manifest
rendering, configuration tests, and any auth/SSO tests this repo provides.
9. Use PR title:
`fix(sec): remediate CVE-2026-42354 in self-hosted Sentry`.
## Stop conditions
- The repository does not deploy a self-hosted Sentry server.
- The only Sentry references are SDKs, DSNs, logging exporters, source-map
upload tooling, or SaaS integrations.
- A fixed self-hosted Sentry version cannot be consumed without a larger
platform migration.
- The patch would automatically alter SAML identity links, organization
ownership, or user accounts without operator approval.
- Validation fails for unrelated pre-existing reasons; document the failure
instead of broadening scope.Verification - what the reviewer looks for
- No self-hosted Sentry server reference remains on
21.12.0through26.4.0. - The change updates the actual deployment source, not only a development or SDK dependency.
- The PR body records multi-organization, SAML, and 2FA exposure status.
- Operator checks cover SAML IdP changes, suspicious identity links, session expiry, and human-reviewed account recovery.
- Build, dependency, image, and deployment-render checks pass or unrelated failures are documented.
Watch for
- Repositories that contain both Sentry SDKs and a self-hosted Sentry deployment; only the server side is relevant to this CVE.
- Floating image tags that make the patch non-reproducible.
- Assuming organization-level SAML controls can enforce account-level 2FA for every user; the workaround depends on users having account 2FA enabled.
- Confusing this advisory with earlier Sentry SAML identity-linking advisories that have different fixed versions.
References
- GitHub Advisory: https://github.com/advisories/GHSA-rcmw-7mc7-3rj7
- Sentry security advisory: https://github.com/getsentry/sentry/security/advisories/GHSA-rcmw-7mc7-3rj7
- Sentry fix PR: https://github.com/getsentry/sentry/pull/113720
- Sentry
26.4.1release: https://github.com/getsentry/sentry/releases/tag/26.4.1