CVE-2023-50249

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-50249
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-50249.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-50249
Aliases
Published
2023-12-20T13:53:00.512Z
Modified
2025-11-29T15:08:51.911816Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Sentry's Astro SDK vulnerable to ReDoS
Details

Sentry-Javascript is official Sentry SDKs for JavaScript. A ReDoS (Regular expression Denial of Service) vulnerability has been identified in Sentry's Astro SDK 7.78.0-7.86.0. Under certain conditions, this vulnerability allows an attacker to cause excessive computation times on the server, leading to denial of service (DoS). This vulnerability has been patched in sentry/astro version 7.87.0.

Database specific
{
    "cwe_ids": [
        "CWE-400"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/50xxx/CVE-2023-50249.json"
}
References

Affected packages

Git / github.com/getsentry/sentry-javascript

Affected ranges

Type
GIT
Repo
https://github.com/getsentry/sentry-javascript
Events

Affected versions

7.*

7.78.0
7.79.0
7.80.0
7.80.1
7.81.0
7.81.1
7.82.0
7.83.0
7.84.0
7.85.0
7.86.0