In affected versions, brotli "bombs" (highly compressed brotli streams, such as many zeros) can be sent to the server. Since the server will attempt to decompress these streams before applying various maximums, this can lead to exhaustion of the available memory and thus a Denial of Service.
This can be done if the DSN is known, which it is in many common setups (JavaScript, Mobile Apps).
Patched in Bugsink 2.0.5
{
"severity": "HIGH",
"nvd_published_at": "2025-11-10T22:15:39Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-770"
],
"github_reviewed_at": "2025-11-13T00:10:50Z"
}