Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @sentry/google-cloud-serverless
  4. ›
  5. CVE-2025-65944

CVE-2025-65944: Sentry's sensitive headers are leaked when `sendDefaultPii` is set to `true`

November 24, 2025 (updated November 27, 2025)

In version 10.11.0, a change to how the SDK collects request data in Node.js applications caused certain incoming HTTP headers to be added as trace span attributes. When sendDefaultPii: true was set, a few headers that were previously redacted - including Authorization and Cookie - were unintentionally allowed through.

Sentry’s server-side scrubbing (handled by Sentry’s Relay edge proxy) normally serves as a second layer of protection. However, because it relied on the same matching logic as the SDK, it also failed to catch these headers in this case.

Users may be impacted if:

  1. Their Sentry SDK configuration has sendDefaultPii set to true
  2. Their application uses one of the Node.js Sentry SDKs with version from 10.11.0 to 10.26.0 inclusively:
  • @sentry/astro
  • @sentry/aws-serverless
  • @sentry/bun
  • @sentry/google-cloud-serverless
  • @sentry/nestjs
  • @sentry/nextjs
  • @sentry/node
  • @sentry/node-core
  • @sentry/nuxt
  • @sentry/remix
  • @sentry/solidstart
  • @sentry/sveltekit

Users can check if their project was affected, by visiting Explore → Traces and searching for “http.request.header.authorization”, “http.request.header.cookie” or similar. Any potentially sensitive values will be specific to users’ applications and configurations.

References

  • github.com/advisories/GHSA-6465-jgvq-jhgp
  • github.com/getsentry/sentry-javascript
  • github.com/getsentry/sentry-javascript/commit/a820fa2891fdcf985b834a5b557edf351ec54539
  • github.com/getsentry/sentry-javascript/pull/17475
  • github.com/getsentry/sentry-javascript/pull/18311
  • github.com/getsentry/sentry-javascript/releases
  • github.com/getsentry/sentry-javascript/releases/tag/10.11.0
  • github.com/getsentry/sentry-javascript/releases/tag/10.27.0
  • github.com/getsentry/sentry-javascript/security/advisories/GHSA-6465-jgvq-jhgp
  • nvd.nist.gov/vuln/detail/CVE-2025-65944

Code Behaviors & Features

Detect and mitigate CVE-2025-65944 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 10.11.0 before 10.27.0

Fixed versions

  • 10.27.0

Solution

Upgrade to version 10.27.0 or above.

Impact 6 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L

Learn more about CVSS

Weakness

  • CWE-201: Insertion of Sensitive Information Into Sent Data

Source file

npm/@sentry/google-cloud-serverless/CVE-2025-65944.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 03 Dec 2025 12:18:47 +0000.