CVE-2025-65944

N/A Unknown

📋 TL;DR

Sentry-Javascript SDK versions 10.11.0 to 10.27.0 inadvertently send sensitive HTTP headers like Cookie to Sentry when sendDefaultPii is enabled. This allows anyone with access to the Sentry organization to view these headers and potentially impersonate users or escalate privileges. Affects Node.js applications using vulnerable Sentry SDK versions with sendDefaultPii: true configuration.

💻 Affected Systems

Products:
  • Sentry-Javascript SDK
Versions: 10.11.0 to 10.27.0 (exclusive)
Operating Systems: All Node.js supported platforms
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when sendDefaultPii: true is explicitly configured in Sentry initialization.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with Sentry organization access steal session cookies, impersonate users, escalate privileges to admin levels, and compromise the entire application.

🟠

Likely Case

Internal users or compromised Sentry accounts access sensitive headers, leading to session hijacking and unauthorized access to user accounts.

🟢

If Mitigated

Limited exposure with proper access controls, but sensitive data remains stored in Sentry traces accessible to authorized Sentry users.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to Sentry organization where traces are stored; no remote code execution or authentication bypass needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.27.0

Vendor Advisory: https://github.com/getsentry/sentry-javascript/security/advisories/GHSA-6465-jgvq-jhgp

Restart Required: Yes

Instructions:

1. Update Sentry-Javascript SDK to version 10.27.0 or later. 2. Run: npm update @sentry/node (or relevant package). 3. Restart your Node.js application.

🔧 Temporary Workarounds

Disable sendDefaultPii

all

Set sendDefaultPii: false in Sentry initialization to prevent sensitive header transmission.

In Sentry.init({ sendDefaultPii: false, ... })

Filter sensitive headers

all

Manually filter out Cookie and other sensitive headers before they reach Sentry SDK.

Implement custom beforeSend or beforeBreadcrumb hooks to remove sensitive data

🧯 If You Can't Patch

  • Disable sendDefaultPii configuration immediately.
  • Restrict Sentry organization access to minimal trusted personnel only.

🔍 How to Verify

Check if Vulnerable:

Check package.json for @sentry/node version between 10.11.0 and 10.27.0, and verify sendDefaultPii: true in Sentry configuration.

Check Version:

npm list @sentry/node

Verify Fix Applied:

Confirm @sentry/node version is 10.27.0 or higher in package.json and check Sentry traces no longer contain Cookie headers.

📡 Detection & Monitoring

Log Indicators:

  • Sentry traces containing Cookie or Authorization headers in stored events

Network Indicators:

  • Outbound traffic to Sentry containing sensitive HTTP headers when sendDefaultPii is enabled

SIEM Query:

source="sentry" AND (header="Cookie" OR header="Authorization")

🔗 References

📤 Share & Export