We found results for “”
CVE-2025-65944
Good to know:
Date: November 24, 2025
Sentry-Javascript is an official Sentry SDKs for JavaScript. From version 10.11.0 to before 10.27.0, when a Node.js application using the Sentry SDK has sendDefaultPii: true it is possible to inadvertently send certain sensitive HTTP headers, including the Cookie header, to Sentry. Those headers would be stored within a Sentry organization as part of the associated trace. A person with access to the Sentry organization could then view and use these sensitive values to impersonate or escalate their privileges within the application. This issue has been patched in version 10.27.0.
Severity Score
Related Resources (10)
Weakness Type (CWE)
Insertion of Sensitive Information Into Sent Data
CWE-201Top Fix
Upgrade Version
Upgrade to version @sentry/node - 10.27.0;@sentry/astro - 10.27.0;@sentry/aws-serverless - 10.27.0;@sentry/bun - 10.27.0;@sentry/google-cloud-serverless - 10.27.0;@sentry/nestjs - 10.27.0;@sentry/nextjs - 10.27.0;@sentry/node-core - 10.27.0;@sentry/nuxt - 10.27.0;@sentry/remix - 10.27.0;@sentry/solidstart - 10.27.0;@sentry/sveltekit - 10.27.0;https://github.com/getsentry/sentry-javascript.git - 10.27.0
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | HIGH |
| User Interaction (UI): | NONE |
| Scope (S): | CHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | NONE |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


