CVE-2025-65944: Sentry's sensitive headers are leaked when `sendDefaultPii` is set to `true`
(updated )
In version 10.11.0, a change to how the SDK collects request data in Node.js applications caused certain incoming HTTP headers to be added as trace span attributes. When sendDefaultPii: true was set, a few headers that were previously redacted - including Authorization and Cookie - were unintentionally allowed through.
Sentry’s server-side scrubbing (handled by Sentry’s Relay edge proxy) normally serves as a second layer of protection. However, because it relied on the same matching logic as the SDK, it also failed to catch these headers in this case.
Users may be impacted if:
- Their Sentry SDK configuration has
sendDefaultPiiset totrue - Their application uses one of the Node.js Sentry SDKs with version from
10.11.0to10.26.0inclusively:
- @sentry/astro
- @sentry/aws-serverless
- @sentry/bun
- @sentry/google-cloud-serverless
- @sentry/nestjs
- @sentry/nextjs
- @sentry/node
- @sentry/node-core
- @sentry/nuxt
- @sentry/remix
- @sentry/solidstart
- @sentry/sveltekit
Users can check if their project was affected, by visiting Explore → Traces and searching for “http.request.header.authorization”, “http.request.header.cookie” or similar. Any potentially sensitive values will be specific to users’ applications and configurations.
References
- github.com/advisories/GHSA-6465-jgvq-jhgp
- github.com/getsentry/sentry-javascript
- github.com/getsentry/sentry-javascript/commit/a820fa2891fdcf985b834a5b557edf351ec54539
- github.com/getsentry/sentry-javascript/pull/17475
- github.com/getsentry/sentry-javascript/pull/18311
- github.com/getsentry/sentry-javascript/releases
- github.com/getsentry/sentry-javascript/releases/tag/10.11.0
- github.com/getsentry/sentry-javascript/releases/tag/10.27.0
- github.com/getsentry/sentry-javascript/security/advisories/GHSA-6465-jgvq-jhgp
- nvd.nist.gov/vuln/detail/CVE-2025-65944
Code Behaviors & Features
Detect and mitigate CVE-2025-65944 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →