Skip to content

Missing Invalidation of Authorization Codes During OAuth Exchange and Revocation

Moderate
mdtro published GHSA-mgh8-h4xc-pfmj Jun 30, 2025

Package

pip sentry (pip)

Affected versions

<25.5.0

Patched versions

25.5.0

Description

Impact

An attacker with a malicious OAuth application registered with Sentry can take advantage of a race condition and improper handling of authorization code within Sentry to maintain persistence to a user's account. With a specially timed requests and redirect flows, an attacker could generate multiple authorization codes that could be used to exchange for access and refresh tokens. This was possible even after de-authorizing the particular application.

Note

  1. A user must explicitly authorize the OAuth application on their account during the authorization code flow.
  2. The OAuth application will only have the same level of access of the particular user in the target organization; even if it requests higher-privileged scopes.

Patches

  • Self-hosted Sentry users should upgrade to version 25.5.0 or higher.
  • Sentry SaaS users do not need to take any action.

Workarounds

There are no known workarounds available for this vulnerability. Sentry self-hosted users should upgrade to 25.5.0 or higher.

References

Severity

Moderate

CVE ID

CVE-2025-53099

Weaknesses

Authentication Bypass Using an Alternate Path or Channel

A product requires authentication, but the product has an alternate path or channel that does not require authentication. Learn more on MITRE.

Credits