Neo4j < 5.26.21 Information Disclosure Vulnerability (CVE-2026-1622)

low Nessus Plugin ID 298972

Synopsis

The remote web server is affected by a Information Disclosure vulnerability

Description

According to its self-reported version number, the version of Neo4j running on the remote host is a version prior to 5.26.21. It is, therefore, affected by a information disclosure vulnerability where The obfuscate_literals option in the query logs does not redact error information, exposing unredacted data in the query log when a customer writes a query that fails. It can allow a user with legitimate access to the local log files to obtain information they are not authorised to see.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number

Solution

Upgrade to Neo4j version 5.26.21 or later.

See Also

https://neo4j.com/security/CVE-2026-1622/

Plugin Details

Severity: Low

ID: 298972

File Name: neo4j_cve-2026-1622.nasl

Version: 1.1

Type: remote

Family: CGI abuses

Published: 2/13/2026

Updated: 2/13/2026

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.9

CVSS v2

Risk Factor: Low

Base Score: 1.7

Vector: CVSS2#AV:L/AC:L/Au:S/C:P/I:N/A:N

CVSS Score Source: CVE-2026-1622

CVSS v3

Risk Factor: Low

Base Score: 3.3

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Vulnerability Information

CPE: cpe:/a:neo4j:neo4j

Required KB Items: installed_sw/Neo4j, Settings/ParanoidReport

Patch Publication Date: 2/4/2026

Vulnerability Publication Date: 2/4/2026

Reference Information

CVE: CVE-2026-1622

IAVB: 2026-B-0036