#VU113022 Authentication bypass using an alternate path or channel in sentry - CVE-2025-53099
Published: July 17, 2025
Vulnerability identifier: #VU113022
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2025-53099
CWE-ID: CWE-288
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
sentry
sentry
Software vendor:
Sentry
Sentry
Description
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to missing invalidation of authorization codes during OAuth exchange and revocation. A remote attacker can bypass authentication and gain access to the target system.
Remediation
Install updates from vendor's website.
External links
- https://github.com/getsentry/sentry/commit/57f0129e1e977b76fe8d16667a586578791a3dcd
- https://github.com/getsentry/sentry/commit/ab5fd932ca6bd46529ba3308b4669e3cee719b8f
- https://github.com/getsentry/sentry/commit/e6241254aead969e6c8490a81cde9a01335df19d
- https://github.com/getsentry/sentry/pull/85570
- https://github.com/getsentry/sentry/pull/85571
- https://github.com/getsentry/sentry/pull/86069
- https://github.com/getsentry/sentry/pull/86532
- https://github.com/getsentry/sentry/security/advisories/GHSA-mgh8-h4xc-pfmj