Sentry's sensitive headers are leaked when `sendDefaultPii` is set to `true` (GHSA-6465-jgvq-jhgp) 10
- Severity:
- Medium
Description
In version 10.11.0, a change to how the SDK collects request data in Node.js applications caused certain incoming HTTP headers to be added as trace span attributes. When sendDefaultPii: true was set, a few headers that were previously redacted - including Authorization and Cookie - were unintentionally allowed through.
Recommendation
Update the @sentry/node package to the latest compatible version. Followings are version details:
- Affected version(s): >= 10.11.0, < 10.27.0
- Patched version(s): 10.27.0
References
Related Issues
- Astro's middleware authentication checks based on url.pathname can be bypassed via url encoded values - CVE-2025-64765
- Potential DoS when using ContextLines integration (GHSA-r5w7-f542-q2j4) 10 - Vulnerability
- Sentry's sensitive headers are leaked when `sendDefaultPii` is set to `true` (GHSA-6465-jgvq-jhgp) 11 - CVE-2025-65944
- Incorrect default cookie name and recommendation - Vulnerability
- Tags:
- npm
- @sentry/node
Anything's wrong? Let us know Last updated on November 27, 2025