JustAppSec
Back to news

CVE-2026-27197: Critical Sentry SAML SSO issue can enable account takeover in some multi-organization deployments

What happened

A CVE record was published for CVE-2026-27197 at 2026-02-21T04:35:14Z describing an Improper Authentication issue in Sentry's SAML SSO implementation that can allow an attacker to take over user accounts under certain conditions.

Who is impacted

  • Product: getsentry/sentry
  • Affected versions: >= 21.12.0 and < 26.2.0
  • The record notes self-hosted risk depends on deployment/permissions conditions in multi-organization setups (including the ability of a malicious user to modify SSO settings for another organization).

What to do now

  • Upgrade Sentry to 26.2.0 (the CVE record states this fixes the issue).
  • If you cannot immediately upgrade, the CVE record recommends enabling user account-based two-factor authentication (2FA) as a workaround/mitigation.

Additional Information

  • CVSS v3.1 (from the CVE record): 9.1 (Critical)CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
  • Weakness: CWE-287 (Improper Authentication)
  • Reference advisory: GHSA-ggmg-cqg6-j45g (linked from the CVE record)
Source: CVEProject cvelistV5
Published 21 Feb 2026Updated 21 Feb 2026