Vulnerability DatabaseGHSA-r5w7-f542-q2j4

GHSA-r5w7-f542-q2j4
JavaScript vulnerability analysis and mitigation

Overview

The vulnerability (GHSA-r5w7-f542-q2j4) affects the ContextLines integration in Sentry JavaScript SDK versions 8.10.0 to 8.49.0. This integration, which is enabled by default in the Node SDK and Node.js environment SDKs, uses readable streams to attach source context to outgoing events. The vulnerability was discovered and disclosed on January 28, 2025, affecting multiple Sentry packages including @sentry/node, @sentry/astro, @sentry/aws-serverless, and others (GitHub Advisory).

Technical details

The vulnerability stems from the ContextLines integration's use of readable streams for file reading operations, where the stream was not explicitly closed after use. The issue has been assigned a CVSS score of 3.7 (Low severity) with a vector string of CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L. The vulnerability is classified under CWE-774 and affects multiple Sentry JavaScript packages that operate in Node.js environments (GitHub Advisory).

Impact

The vulnerability could lead to excessive amounts of file handles remaining open on the system, potentially resulting in a Denial of Service (DoS) condition. This occurs because the readable streams used for reading files are not properly closed after their use, leading to resource exhaustion (GitHub Advisory).

Mitigation and workarounds

Users are advised to upgrade to version 8.49.0 or higher to address this vulnerability. For those unable to upgrade immediately, a workaround is available by disabling the ContextLines integration through the Sentry.init configuration. However, disabling this integration will result in the loss of source context on error events (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67731HIGH8.7
  • JavaScriptJavaScript
  • servify-express
NoYesDec 12, 2025
CVE-2025-67718HIGH8.7
  • JavaScriptJavaScript
  • formio
NoYesDec 11, 2025
CVE-2025-8083HIGH8.6
  • JavaScriptJavaScript
  • vuetify
NoYesDec 12, 2025
CVE-2025-67750HIGH8.4
  • JavaScriptJavaScript
  • lightning-flow-scanner
NoYesDec 12, 2025
CVE-2025-8082MEDIUM6.3
  • JavaScriptJavaScript
  • vuetify
NoYesDec 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management