HIGHVulnerability
Verified
Global

NVD HIGH: CVE-2021-47935 — Sentry 8.2.0 contains a remote code execution vulnerability that allows authenti...

·Source: NIST NVD

Updated:

Executive Summary

Sentry 8.2.0 contains a remote code execution vulnerability that allows authenticated superusers to execute arbitrary commands by injecting malicious pickle-serialized objects through the audit log entry data parameter. Attackers can submit crafted POST requests to the admin audit log endpoint with base64-encoded compressed pickle payloads in the data field to achieve code execution with applicati

Analysis

Sentry 8.2.0 contains a remote code execution vulnerability that allows authenticated superusers to execute arbitrary commands by injecting malicious pickle-serialized objects through the audit log entry data parameter. Attackers can submit crafted POST requests to the admin audit log endpoint with base64-encoded compressed pickle payloads in the data field to achieve code execution with application privileges. CVSS Score: 8.8. Published: 2026-05-10T13:16:29.693.

Indicators of Compromise (1)

CVE (1)
CVE-2021-47935
Source Attribution

Originally published by NIST NVD on May 10, 2026. Verified by: NIST.

Related Threats