CVE-2023-39349
Python vulnerability analysis and mitigation

Overview

Sentry, an error tracking and performance monitoring platform, disclosed a vulnerability (CVE-2023-39349) affecting versions 22.1.0 through 23.7.2. The vulnerability was discovered where an attacker with access to a token with minimal or no scopes could query /api/0/api-tokens/ to obtain a list of all tokens created by a user, including those with greater privileges (Sentry Advisory, NVD).

Technical details

The vulnerability stems from an authentication bypass issue in the ApiTokensEndpoint, where the system failed to properly validate token scopes when accessing the token listing endpoint. The vulnerability has been assigned a CVSS v3.1 base score of 8.1 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N, indicating a network-exploitable vulnerability with low attack complexity (NVD).

Impact

The vulnerability allows attackers to escalate their privileges by obtaining access to tokens with greater scopes than their initial access level. This could potentially lead to unauthorized access to sensitive information and functionality within the Sentry platform. While there is no evidence of exploitation on sentry.io, the impact could be significant for affected installations (Sentry Advisory).

Mitigation and workarounds

The vulnerability has been patched in Sentry version 23.7.2. Self-hosted users are advised to upgrade to this version and rotate their user authentication tokens. For self-hosted installations, token rotation can be performed via the path /settings/account/api/auth-tokens/. There are no known workarounds for this vulnerability (Sentry Advisory, Release Notes).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66423HIGH7.1
  • PythonPython
  • tryton-server
NoYesNov 30, 2025
CVE-2025-66454MEDIUM6.5
  • PythonPython
  • arcade-mcp-server
NoYesDec 02, 2025
CVE-2025-66424MEDIUM6.5
  • PythonPython
  • trytond
NoYesNov 30, 2025
CVE-2025-66422MEDIUM4.3
  • PythonPython
  • tryton-server
NoYesNov 30, 2025
CVE-2025-65858LOW3.5
  • PythonPython
  • calibreweb
NoNoDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management