Skip to content

Regarding Use of getSerializable() and Potential Insecure Deserialization in Sentry SDK #4583

@Synctest-hub

Description

@Synctest-hub

Description

While analyzing our Android application integrated with the Sentry Flutter SDK, we identified potential usage of android.os.Bundle.getSerializable() within internal calls originating from io.sentry.flutter.SentryFlutterPlugin. This appears to present an insecure deserialization risk, potentially allowing arbitrary code execution if untrusted input is processed.

We did not find any such use in our Dart codebase, and during APK decompilation, these flows appear to originate from the native SDK layer. Could you please confirm whether the Sentry Flutter/Android SDK enforces any validation, class whitelisting, or sandboxing when handling deserialized objects via getSerializable()? If not, is there a recommended mitigation or planned fix?

Metadata

Metadata

Assignees

Labels

Projects

Status

No status

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions