CVE-2023-46729

Source
https://cve.org/CVERecord?id=CVE-2023-46729
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-46729.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-46729
Aliases
Published
2023-11-10T00:57:15.611Z
Modified
2025-11-29T14:49:27.375832Z
Severity
  • 9.3 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N CVSS Calculator
Summary
Sentry Next.js vulnerable to SSRF via Next.js SDK tunnel endpoint
Details

sentry-javascript provides Sentry SDKs for JavaScript. An unsanitized input of Next.js SDK tunnel endpoint allows sending HTTP requests to arbitrary URLs and reflecting the response back to the user. This issue only affects users who have Next.js SDK tunneling feature enabled. The problem has been fixed in version 7.77.0.

Database specific
{
    "cwe_ids": [
        "CWE-918"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/46xxx/CVE-2023-46729.json"
}
References

Affected packages

Git / github.com/getsentry/sentry-javascript

Affected ranges

Type
GIT
Repo
https://github.com/getsentry/sentry-javascript
Events

Affected versions

7.*

7.26.0
7.27.0
7.28.0
7.28.1
7.29.0
7.30.0
7.31.0
7.31.1
7.32.0
7.32.1
7.33.0
7.34.0
7.35.0
7.36.0
7.37.0
7.37.1
7.37.2
7.38.0
7.39.0
7.40.0
7.41.0
7.42.0
7.43.0
7.44.0
7.44.1
7.44.2
7.45.0
7.46.0
7.47.0
7.48.0
7.49.0
7.50.0
7.51.0
7.51.1
7.51.2
7.52.0
7.52.1
7.53.0
7.53.1
7.54.0
7.55.0
7.55.1
7.55.2
7.56.0
7.57.0
7.58.0
7.58.1
7.59.2
7.59.3
7.60.0
7.60.1
7.61.0
7.61.1
7.62.0
7.63.0
7.64.0
7.65.0
7.66.0
7.67.0
7.68.0
7.69.0
7.70.0
7.71.0
7.72.0
7.73.0
7.74.0
7.74.1
7.75.0
7.75.1
7.76.0

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-46729.json"