{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T08:09:49.491","vulnerabilities":[{"cve":{"id":"CVE-2025-53073","sourceIdentifier":"cve@mitre.org","published":"2025-06-24T18:15:26.813","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In Sentry 25.1.0 through 25.5.1, an authenticated attacker can access a project's issue endpoint and perform unauthorized actions (such as adding a comment) without being a member of the project's team. A seven-digit issue ID must be known (it is not treated as a secret and might be mentioned publicly, or it could be predicted)."},{"lang":"es","value":"En Sentry 25.1.0 a 25.5.1, un atacante autenticado puede acceder al endpoint de incidencia de un proyecto y realizar acciones no autorizadas (como añadir un comentario) sin ser miembro del equipo del proyecto. Se debe conocer un ID de incidencia de siete dígitos (no se trata como secreto y puede mencionarse públicamente o predecirse)."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":4.2,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":2.5}]},"weaknesses":[{"source":"cve@mitre.org","type":"Secondary","description":[{"lang":"en","value":"CWE-425"}]}],"references":[{"url":"https://github.com/getsentry/self-hosted/releases","source":"cve@mitre.org"},{"url":"https://github.com/nikolas-ch/CVEs/blob/main/Sentry_Version%3E%3D25.1.0/Sentry_%3E%3D25.1.0_WeakAuthorizationControl.txt","source":"cve@mitre.org"},{"url":"https://github.com/nikolas-ch/CVEs/tree/main/Sentry_Version%3E%3D25.1.0","source":"cve@mitre.org"}]}}]}