{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-53099","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-06-25T13:41:23.086Z","datePublished":"2025-07-01T14:53:16.878Z","dateUpdated":"2025-07-01T15:06:29.774Z"},"containers":{"cna":{"title":"Sentry Missing Invalidation of Authorization Codes During OAuth Exchange and Revocation","problemTypes":[{"descriptions":[{"cweId":"CWE-288","lang":"en","description":"CWE-288: Authentication Bypass Using an Alternate Path or Channel","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"LOW","userInteraction":"PASSIVE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","subAvailabilityImpact":"HIGH","baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H","version":"4.0"}}],"references":[{"name":"https://github.com/getsentry/sentry/security/advisories/GHSA-mgh8-h4xc-pfmj","tags":["x_refsource_CONFIRM"],"url":"https://github.com/getsentry/sentry/security/advisories/GHSA-mgh8-h4xc-pfmj"},{"name":"https://github.com/getsentry/sentry/pull/85570","tags":["x_refsource_MISC"],"url":"https://github.com/getsentry/sentry/pull/85570"},{"name":"https://github.com/getsentry/sentry/pull/85571","tags":["x_refsource_MISC"],"url":"https://github.com/getsentry/sentry/pull/85571"},{"name":"https://github.com/getsentry/sentry/pull/86069","tags":["x_refsource_MISC"],"url":"https://github.com/getsentry/sentry/pull/86069"},{"name":"https://github.com/getsentry/sentry/pull/86532","tags":["x_refsource_MISC"],"url":"https://github.com/getsentry/sentry/pull/86532"},{"name":"https://github.com/getsentry/sentry/commit/57f0129e1e977b76fe8d16667a586578791a3dcd","tags":["x_refsource_MISC"],"url":"https://github.com/getsentry/sentry/commit/57f0129e1e977b76fe8d16667a586578791a3dcd"},{"name":"https://github.com/getsentry/sentry/commit/ab5fd932ca6bd46529ba3308b4669e3cee719b8f","tags":["x_refsource_MISC"],"url":"https://github.com/getsentry/sentry/commit/ab5fd932ca6bd46529ba3308b4669e3cee719b8f"},{"name":"https://github.com/getsentry/sentry/commit/e6241254aead969e6c8490a81cde9a01335df19d","tags":["x_refsource_MISC"],"url":"https://github.com/getsentry/sentry/commit/e6241254aead969e6c8490a81cde9a01335df19d"}],"affected":[{"vendor":"getsentry","product":"sentry","versions":[{"version":"< 25.5.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-07-01T14:53:16.878Z"},"descriptions":[{"lang":"en","value":"Sentry is a developer-first error tracking and performance monitoring tool. Prior to version 25.5.0, an attacker with a malicious OAuth application registered with Sentry can take advantage of a race condition and improper handling of authorization code within Sentry to maintain persistence to a user's account. With a specially timed requests and redirect flows, an attacker could generate multiple authorization codes that could be used to exchange for access and refresh tokens. This was possible even after de-authorizing the particular application. This issue has been patched in version 25.5.0. Self-hosted Sentry users should upgrade to version 25.5.0 or higher. Sentry SaaS users do not need to take any action."}],"source":{"advisory":"GHSA-mgh8-h4xc-pfmj","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-01T15:06:16.063257Z","id":"CVE-2025-53099","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-01T15:06:29.774Z"}}]}}