CVE-2021-47935
HIGH
NVD
CVSS Score
8.8
Severity
HIGH
Published
May 10, 2026
Vendor
unknown
Description
Sentry 8.2.0 contains a remote code execution vulnerability that allows authenticated superusers to execute arbitrary commands by injecting malicious pickle-serialized objects through the audit log entry data parameter. Attackers can submit crafted POST requests to the admin audit log endpoint with base64-encoded compressed pickle payloads in the data field to achieve code execution with application privileges.