Sentry SAML SSO Improper Authentication Vulnerability
A critical vulnerability in Sentry's SAML SSO implementation allows account takeover by exploiting improper authentication when multiple organizations are configured, affecting versions 21.12.0 to 26.2.0 and requiring a malicious SAML Identity Provider and knowledge of the victim's email address.
A critical vulnerability (CVE-2026-27197) has been identified in the SAML Single Sign-On (SSO) implementation within Sentry, a popular error tracking and performance monitoring platform. This vulnerability allows a malicious actor to potentially take over user accounts by leveraging a rogue SAML Identity Provider (IdP) in conjunction with another organization configured within the same Sentry instance. The attacker needs to know the victim’s email address for successful exploitation. This flaw primarily impacts self-hosted Sentry deployments with multiple organizations enabled (SENTRY_SINGLE_ORGANIZATION = False) and where a malicious user possesses the ability to modify SSO settings for another organization. Sentry SaaS was patched on February 18, 2026. Self-hosted users should upgrade to version 26.2.0 or later to remediate this vulnerability.
Attack Chain
- The attacker gains access to a Sentry instance that hosts multiple organizations. This could be through compromised credentials or other initial access vectors.
- The attacker identifies a target user’s email address within the Sentry instance.
- The attacker gains permissions to modify SSO settings for an organization within the Sentry instance.
- The attacker configures a malicious SAML Identity Provider (IdP) for the organization they control. This IdP is designed to spoof user identities.
- The victim attempts to log in to Sentry via SAML SSO.
- Sentry redirects the victim to the attacker’s malicious SAML IdP for authentication.
- The attacker’s malicious SAML IdP asserts the victim’s identity (using the known email address) to Sentry, but the assertion is illegitimate and controlled by the attacker.
- Sentry, due to the vulnerability, improperly validates the SAML assertion, allowing the attacker to successfully authenticate as the victim and gain unauthorized access to their account.
Impact
Successful exploitation of this vulnerability allows an attacker to completely take over a targeted user’s Sentry account. This grants the attacker the ability to access sensitive project data, modify configurations, invite/remove team members, and potentially disrupt the entire Sentry instance’s operations. The vulnerability affects Sentry versions 21.12.0 up to, but not including, 26.2.0. The number of potential victims depends on the number of vulnerable Sentry instances with multiple organizations configured and the attacker’s ability to modify SSO settings.
Recommendation
- Upgrade self-hosted Sentry instances to version 26.2.0 or later to patch CVE-2026-27197.
- Enable two-factor authentication (2FA) on all Sentry accounts. Users can manage this in Account Settings > Security, as mentioned in the helpdesk article.
- Monitor Sentry logs for unusual SSO configuration changes, specifically modifications to SAML Identity Provider settings. Deploy a rule that detects modifications to the
SENTRY_SINGLE_ORGANIZATIONsetting, as this is a prerequisite for exploitation. - Implement the Sigma rule
Detect Suspicious SAML Authenticationto identify potential unauthorized SAML authentication attempts based on unusual IP addresses or user agents.
Detection coverage 2
Detect Suspicious SAML Authentication
mediumDetects suspicious SAML authentication attempts based on unusual IP addresses or user agents. This requires Sentry audit logs with detailed authentication information.
Detect Modification of SENTRY_SINGLE_ORGANIZATION Setting
highDetects attempts to modify the SENTRY_SINGLE_ORGANIZATION setting, which is a prerequisite for exploiting the SAML SSO vulnerability.
Detection queries are kept inside the platform. Get full rules →