CVE-2026-26004
Received Received - Intake
IDOR Vulnerability in Sentry GroupEventJsonView Allows Data Exposure

Publication date: 2026-03-18

Last updated on: 2026-03-23

Assigner: GitHub, Inc.

Description
Sentry is a developer-first error tracking and performance monitoring tool. Versions prior to 26.1.0 have a cross-organization Insecure Direct Object Reference (IDOR) vulnerability in Sentry's GroupEventJsonView endpoint. Version 26.1.0 patches the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-18
Last Modified
2026-03-23
Generated
2026-05-07
AI Q&A
2026-03-18
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sentry sentry to 26.1.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2026-26004 is a cross-organization Insecure Direct Object Reference (IDOR) vulnerability in Sentry's GroupEventJsonView endpoint. The issue arises because the endpoint's get method calls a function to retrieve group event data without passing the organization context, which causes organization-level permission checks to be bypassed. As a result, an authenticated user with event read permissions in their own organization can manipulate the group_id parameter to access sensitive event data belonging to other organizations."}, {'type': 'paragraph', 'content': 'The vulnerability occurs because the authorization model only checks permissions against the active organization context, not the actual organization owning the resource. This allows unauthorized access to event data across organizational boundaries.'}] [1, 2, 3]


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': 'This vulnerability can lead to unauthorized access to sensitive event data from other organizations within the Sentry platform. An attacker who is authenticated in their own organization and has event read permissions can exploit this flaw to view event details from victim organizations by guessing or knowing the group_id of those events.'}, {'type': 'paragraph', 'content': "Such unauthorized access can expose confidential information about errors and performance issues in other organizations' applications, potentially leading to information leakage, privacy violations, and increased risk of further attacks."}] [1, 2, 3]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by attempting to access event data from another organization using an authenticated user with event:read permission in their own organization. Specifically, by manipulating the group_id parameter in the URL to reference a group from a different organization, unauthorized access can be tested.'}, {'type': 'paragraph', 'content': 'A practical detection method involves using a curl command to request event data from the GroupEventJsonView endpoint with a guessed group_id from another organization while authenticated as a user from your own organization.'}, {'type': 'paragraph', 'content': 'Example curl command to test unauthorized access (replace placeholders accordingly):'}, {'type': 'list_item', 'content': 'curl -H "Cookie: session=<attacker_session_token>" https://<sentry-host>/organizations/<attacker_org_slug>/issues/<victim_group_id>/events/latest/json/'}, {'type': 'paragraph', 'content': 'If the response returns event data instead of an error (e.g., 404), it indicates the vulnerability is present.'}] [2]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade Sentry to version 26.1.0 or later, where this vulnerability has been patched.

The patch enforces organization-level permission checks by passing the organization context to the get_group_with_redirect method in the GroupEventJsonView endpoint, preventing unauthorized cross-organization access.

Until the upgrade can be applied, restrict access to the GroupEventJsonView endpoint to trusted users only and monitor for suspicious access patterns involving group_id parameter manipulation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart