CVE-2025-65944

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-65944
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-65944.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-65944
Aliases
Related
Published
2025-11-25T00:23:53.215Z
Modified
2025-11-28T02:34:30.468367Z
Severity
  • 5.1 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:L/SA:L CVSS Calculator
Summary
Sentry-Javascript deals with leaked sensitive headers when `sendDefaultPii` is set to `true`
Details

Sentry-Javascript is an official Sentry SDKs for JavaScript. From version 10.11.0 to before 10.27.0, when a Node.js application using the Sentry SDK has sendDefaultPii: true it is possible to inadvertently send certain sensitive HTTP headers, including the Cookie header, to Sentry. Those headers would be stored within a Sentry organization as part of the associated trace. A person with access to the Sentry organization could then view and use these sensitive values to impersonate or escalate their privileges within the application. This issue has been patched in version 10.27.0.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-201"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/65xxx/CVE-2025-65944.json"
}
References

Affected packages

Git / github.com/getsentry/sentry-javascript

Affected ranges

Type
GIT
Repo
https://github.com/getsentry/sentry-javascript
Events

Affected versions

10.*

10.11.0
10.12.0
10.13.0
10.14.0
10.15.0
10.16.0
10.17.0
10.18.0
10.19.0
10.20.0
10.21.0
10.22.0
10.23.0
10.24.0
10.25.0
10.26.0