CVE-2026-1337

5.4 MEDIUM

📋 TL;DR

This vulnerability allows cross-site scripting (XSS) attacks when Neo4j query logs containing insufficiently escaped unicode characters are opened in tools that interpret them as HTML. It affects Neo4j Enterprise and Community editions prior to version 2026.01. The vulnerability only impacts log viewing, not the Neo4j database itself.

💻 Affected Systems

Products:
  • Neo4j Enterprise
  • Neo4j Community
Versions: All versions prior to 2026.01
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects log viewing, not database operations. Requires logs to be opened in HTML-rendering tools.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could execute arbitrary JavaScript in the context of a user viewing Neo4j logs in a web-based log viewer, potentially leading to session hijacking, credential theft, or further system compromise.

🟠

Likely Case

Limited impact since most administrators view logs in plain text editors or command-line tools rather than HTML-rendering applications.

🟢

If Mitigated

No security impact if logs are treated as plain text files or if patched versions are used.

🌐 Internet-Facing: LOW - The vulnerability requires access to log files and specific viewing conditions, not direct network exploitation.
🏢 Internal Only: MEDIUM - Internal administrators viewing logs in vulnerable tools could be targeted through crafted log entries.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to inject unicode characters into query logs and for victims to view logs in HTML-rendering tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2026.01

Vendor Advisory: https://github.com/JoakimBulow/CVE-2026-1337

Restart Required: Yes

Instructions:

1. Backup your Neo4j database and configuration. 2. Download Neo4j version 2026.01 or later from the official Neo4j website. 3. Stop the Neo4j service. 4. Install the updated version following Neo4j's upgrade documentation. 5. Restart the Neo4j service.

🔧 Temporary Workarounds

Treat logs as plain text

all

Always open Neo4j query logs in plain text editors or command-line viewers that don't interpret HTML.

Use commands like 'cat', 'less', 'more', or 'tail -f' for log viewing

Restrict log access

linux

Limit access to Neo4j log files to trusted administrators only.

chmod 600 neo4j.log
chown neo4j:neo4j neo4j.log

🧯 If You Can't Patch

  • Implement strict access controls on Neo4j log directories and files
  • Train administrators to only view logs in plain text editors, never in web browsers or HTML-rendering tools

🔍 How to Verify

Check if Vulnerable:

Check Neo4j version: if version is earlier than 2026.01, the system is vulnerable.

Check Version:

neo4j version

Verify Fix Applied:

Confirm Neo4j version is 2026.01 or later and test log viewing with sample unicode queries.

📡 Detection & Monitoring

Log Indicators:

  • Unusual unicode sequences in query logs
  • JavaScript-like patterns in log entries

Network Indicators:

  • No network-based indicators as this is a local log viewing vulnerability

SIEM Query:

No applicable SIEM query for this local file vulnerability

🔗 References

📤 Share & Export