CVE-2026-1622

N/A Unknown

📋 TL;DR

Neo4j query logs fail to redact error information when 'obfuscate_literals' is enabled, potentially exposing sensitive data. This affects users with legitimate access to local log files who can also run queries to trigger errors. Organizations using vulnerable Neo4j Enterprise or Community editions are impacted.

💻 Affected Systems

Products:
  • Neo4j Enterprise
  • Neo4j Community
Versions: All versions prior to 2026.01.3 and 5.26.21
Operating Systems: All operating systems running Neo4j
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when 'db.logs.query.obfuscate_literals' is enabled in configuration. The obfuscation feature must be actively used for this vulnerability to be relevant.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated user with log file access could infer sensitive database information through error messages in query logs, potentially leading to unauthorized data disclosure.

🟠

Likely Case

Users with both query execution and log file access could gradually infer limited unauthorized information through repeated error analysis.

🟢

If Mitigated

With proper log file permissions and the fix applied, the risk is eliminated as error information becomes properly obfuscated.

🌐 Internet-Facing: LOW - This requires local file system access to log files, not network exploitation.
🏢 Internal Only: MEDIUM - Internal users with both query execution privileges and log file access could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires: 1) Access to local log files, 2) Ability to execute queries that trigger errors, 3) 'obfuscate_literals' enabled in configuration. This is an information disclosure vulnerability, not remote code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2026.01.3 or 5.26.21

Vendor Advisory: https://neo4j.com/security/CVE-2026-1622

Restart Required: Yes

Instructions:

1. Download Neo4j version 2026.01.3 or 5.26.21 from official Neo4j website. 2. Stop the Neo4j service. 3. Backup your current installation and data. 4. Install the patched version. 5. Enable 'db.logs.query.obfuscate_errors' in configuration if you want error obfuscation. 6. Restart Neo4j service.

🔧 Temporary Workarounds

Restrict Log File Permissions

linux

Limit access to Neo4j log files to only necessary administrative users

chmod 640 /path/to/neo4j/logs/*.log
chown neo4j:admin /path/to/neo4j/logs/*.log

Disable Query Log Obfuscation

all

Temporarily disable the vulnerable obfuscation feature until patching

Set db.logs.query.obfuscate_literals=false in neo4j.conf

🧯 If You Can't Patch

  • Implement strict access controls on Neo4j log directories and files
  • Disable 'db.logs.query.obfuscate_literals' configuration setting

🔍 How to Verify

Check if Vulnerable:

Check Neo4j version and configuration: 1. Run 'neo4j --version' 2. Check if version is below 2026.01.3 or 5.26.21 3. Verify if 'db.logs.query.obfuscate_literals=true' in neo4j.conf

Check Version:

neo4j --version

Verify Fix Applied:

1. Confirm Neo4j version is 2026.01.3 or 5.26.21 via 'neo4j --version' 2. Verify 'db.logs.query.obfuscate_errors' is enabled if error obfuscation is desired 3. Test by running queries that trigger errors and checking log output

📡 Detection & Monitoring

Log Indicators:

  • Unredacted error messages in query.log files when obfuscation is enabled
  • Sensitive data appearing in error stack traces

Network Indicators:

  • No network indicators - this is a local file system vulnerability

SIEM Query:

No applicable network SIEM query. Monitor file access logs to Neo4j query log files for unusual access patterns.

🔗 References

📤 Share & Export