Sentry 8.2.0 RCE: Authenticated Superusers Can Execute Arbitrary Code
The National Vulnerability Database has detailed CVE-2021-47935, a high-severity remote code execution (RCE) vulnerability impacting Sentry version 8.2.0. This flaw allows authenticated superusers to execute arbitrary commands by injecting malicious pickle-serialized objects. The attack vector involves submitting crafted POST requests to the admin audit log endpoint, embedding base64-encoded, compressed pickle payloads within the data field.
This vulnerability, with a CVSS score of 8.8 (HIGH), poses a significant risk. An attacker with superuser credentials can leverage this to achieve full code execution with the application’s privileges. While requiring authenticated superuser access limits the attack surface, the potential for complete system compromise makes this a critical issue for affected deployments.
Defenders must recognize that any compromise of a superuser account, whether through phishing, credential stuffing, or insider threat, immediately escalates to RCE in vulnerable Sentry instances. The core issue lies in insecure deserialization (CWE-94), a perennial problem that continues to plague applications handling untrusted data.
What This Means For You
- If your organization uses Sentry 8.2.0, you are exposed. Prioritize patching or upgrading immediately. More critically, audit all superuser accounts for suspicious activity and strengthen credential management, including MFA, for these high-privilege accounts. An attacker's calculus here is simple: compromise a superuser, own the system.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2021-47935: Sentry Authenticated RCE via Pickle in Audit Log
title: CVE-2021-47935: Sentry Authenticated RCE via Pickle in Audit Log
id: scw-2026-05-10-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2021-47935 by targeting the Sentry admin audit log endpoint with a POST request containing a pickle-serialized payload. The presence of '!!python/object/apply:os.system' within the 'data' parameter is a strong indicator of an attempt to execute arbitrary commands using the pickle deserialization vulnerability.
author: SCW Feed Engine (AI-generated)
date: 2026-05-10
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2021-47935/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/admin/audit-log/'
cs-method:
- 'POST'
selection_payload:
data|contains:
- '!!python/object/apply:os.system'
condition: selection AND selection_payload
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2021-47935 | RCE | Sentry 8.2.0 |
| CVE-2021-47935 | RCE | Injection of malicious pickle-serialized objects |
| CVE-2021-47935 | RCE | audit log entry data parameter |
| CVE-2021-47935 | RCE | POST requests to /admin/audit-log endpoint with base64-encoded compressed pickle payloads in the data field |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 10, 2026 at 16:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.