Menu
CVE-2026-27197: Critical Sentry SAML SSO issue can enable account takeover in some multi-organization deployments
What happened
A CVE record was published for CVE-2026-27197 at 2026-02-21T04:35:14Z describing an Improper Authentication issue in Sentry's SAML SSO implementation that can allow an attacker to take over user accounts under certain conditions.
Who is impacted
- Product: getsentry/sentry
- Affected versions: >= 21.12.0 and < 26.2.0
- The record notes self-hosted risk depends on deployment/permissions conditions in multi-organization setups (including the ability of a malicious user to modify SSO settings for another organization).
What to do now
- Upgrade Sentry to 26.2.0 (the CVE record states this fixes the issue).
- If you cannot immediately upgrade, the CVE record recommends enabling user account-based two-factor authentication (2FA) as a workaround/mitigation.
Additional Information
- CVSS v3.1 (from the CVE record): 9.1 (Critical) —
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N - Weakness: CWE-287 (Improper Authentication)
- Reference advisory: GHSA-ggmg-cqg6-j45g (linked from the CVE record)
Published 21 Feb 2026Updated 21 Feb 2026
