Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6465-jgvq-jhgp

Опубликовано: 24 нояб. 2025
Источник: github
Github: Прошло ревью
CVSS4: 5.1

Описание

Sentry's sensitive headers are leaked when sendDefaultPii is set to true

Impact

In version 10.11.0, a change to how the SDK collects request data in Node.js applications caused certain incoming HTTP headers to be added as trace span attributes. When sendDefaultPii: true was set, a few headers that were previously redacted - including Authorization and Cookie - were unintentionally allowed through.

Sentry’s server-side scrubbing (handled by Sentry's Relay edge proxy) normally serves as a second layer of protection. However, because it relied on the same matching logic as the SDK, it also failed to catch these headers in this case.

Users may be impacted if:

  1. Their Sentry SDK configuration has sendDefaultPii set to true
  2. Their application uses one of the Node.js Sentry SDKs with version from 10.11.0 to 10.26.0 inclusively:
  • @sentry/astro
  • @sentry/aws-serverless
  • @sentry/bun
  • @sentry/google-cloud-serverless
  • @sentry/nestjs
  • @sentry/nextjs
  • @sentry/node
  • @sentry/node-core
  • @sentry/nuxt
  • @sentry/remix
  • @sentry/solidstart
  • @sentry/sveltekit

Users can check if their project was affected, by visiting Explore → Traces and searching for “http.request.header.authorization”, “http.request.header.cookie” or similar. Any potentially sensitive values will be specific to users' applications and configurations.

Patches

The issue has been patched in all Sentry JavaScript SDKs starting from the 10.27.0 version.

Workarounds

Sentry strongly encourage customers to upgrade the SDK to the latest available version, 10.27.0 or later. If it is not possible, consider setting sendDefaultPii: false to avoid unintentionally sending sensitive headers. See here for documentation.

Resources

Пакеты

Наименование

@sentry/node

npm
Затронутые версииВерсия исправления

>= 10.11.0, < 10.27.0

10.27.0

Наименование

@sentry/astro

npm
Затронутые версииВерсия исправления

>= 10.11.0, < 10.27.0

10.27.0

Наименование

@sentry/aws-serverless

npm
Затронутые версииВерсия исправления

>= 10.11.0, < 10.27.0

10.27.0

Наименование

@sentry/bun

npm
Затронутые версииВерсия исправления

>= 10.11.0, < 10.27.0

10.27.0

Наименование

@sentry/google-cloud-serverless

npm
Затронутые версииВерсия исправления

>= 10.11.0, < 10.27.0

10.27.0

Наименование

@sentry/nestjs

npm
Затронутые версииВерсия исправления

>= 10.11.0, < 10.27.0

10.27.0

Наименование

@sentry/nextjs

npm
Затронутые версииВерсия исправления

>= 10.11.0, < 10.27.0

10.27.0

Наименование

@sentry/node-core

npm
Затронутые версииВерсия исправления

>= 10.11.0, < 10.27.0

10.27.0

Наименование

@sentry/nuxt

npm
Затронутые версииВерсия исправления

>= 10.11.0, < 10.27.0

10.27.0

Наименование

@sentry/remix

npm
Затронутые версииВерсия исправления

>= 10.11.0, < 10.27.0

10.27.0

Наименование

@sentry/solidstart

npm
Затронутые версииВерсия исправления

>= 10.11.0, < 10.27.0

10.27.0

Наименование

@sentry/sveltekit

npm
Затронутые версииВерсия исправления

>= 10.11.0, < 10.27.0

10.27.0

EPSS

Процентиль: 18%
0.00058
Низкий

5.1 Medium

CVSS4

Дефекты

CWE-201

Связанные уязвимости

nvd
2 месяца назад

Sentry-Javascript is an official Sentry SDKs for JavaScript. From version 10.11.0 to before 10.27.0, when a Node.js application using the Sentry SDK has sendDefaultPii: true it is possible to inadvertently send certain sensitive HTTP headers, including the Cookie header, to Sentry. Those headers would be stored within a Sentry organization as part of the associated trace. A person with access to the Sentry organization could then view and use these sensitive values to impersonate or escalate their privileges within the application. This issue has been patched in version 10.27.0.

EPSS

Процентиль: 18%
0.00058
Низкий

5.1 Medium

CVSS4

Дефекты

CWE-201