CVE-2021-47935 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: May 10, 2026
Sentry - Remote Code Execution
Published: May 10, 2026Updated: May 10, 2026Remote Exploitable
Overview
Sentry 8.2.0 contains a remote code execution caused by injection of malicious pickle-serialized objects in the audit log entry data parameter, letting authenticated superusers execute arbitrary commands remotely, exploit requires superuser authentication.
Severity & Score
Severity: High
CVSS Score: 8.8
Impact
Authenticated superusers can execute arbitrary commands with application privileges, potentially compromising the entire system.
Mitigation
Update to the latest version of Sentry.
References
Related Resources
Details
- CVE ID
- CVE-2021-47935
- Severity
- High
- CVSS Score
- 8.8
- Type
- insecure_deserialization
- Status
- new
CWE
- CWE-94
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H