-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from insecure regex patterns in the tunnel rewrite configuration. The commit diff shows the fix replaced '.' with strict patterns ([a-fA-F0-9] for orgid, \d* for projectid). The setUpTunnelRewriteRules function was responsible for creating these vulnerable rewrite rules that didn't properly validate input, allowing attackers to craft malicious URLs that bypassed domain restrictions. This matches the SSRF impact described in the advisory where arbitrary HTTP requests could be sent via manipulated parameters.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| @sentry/nextjs | npm | >= 7.26.0, < 7.77.0 | 7.77.0 |