CVE-2021-47935
Severity CVSS v4.0:
HIGH
Type:
CWE-94
Code Injection
Publication date:
10/05/2026
Last modified:
14/05/2026
Description
Sentry 8.2.0 contains a remote code execution vulnerability that allows authenticated superusers to execute arbitrary commands by injecting malicious pickle-serialized objects through the audit log entry data parameter. Attackers can submit crafted POST requests to the admin audit log endpoint with base64-encoded compressed pickle payloads in the data field to achieve code execution with application privileges.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:sentry:sentry:8.2.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



