Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

Enterprise Edition

Source -

CNA

CNA CVEs -

4

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

0
Related CVEsRelated VendorsRelated AssignersReports
4Vulnerabilities found

CVE-2026-1337
Assigner-3b236295-4ccd-4a1f-a1c1-a72eecc8d7b6
ShareView Details
Assigner-3b236295-4ccd-4a1f-a1c1-a72eecc8d7b6
CVSS Score-1.1||LOW
EPSS-0.02% / 3.15%
||
7 Day CHG-0.03%
Published-06 Feb, 2026 | 13:13
Updated-06 Feb, 2026 | 15:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insufficient escaping of unicode characters in query log

Insufficient escaping of unicode characters in query log in Neo4j Enterprise and Community editions prior to 2026.01 can lead to XSS if the user opens the logs in a tool that treats them as HTML. There is no security impact on Neo4j products, but this advisory is released as a precaution to treat the logs as plain text if using versions prior to 2026.01. Proof of concept exploit:  https://github.com/JoakimBulow/CVE-2026-1337

Action-Not Available
Vendor-neo4j
Product-Community EditionEnterprise Edition
CWE ID-CWE-117
Improper Output Neutralization for Logs
CVE-2026-1622
Assigner-3b236295-4ccd-4a1f-a1c1-a72eecc8d7b6
ShareView Details
Assigner-3b236295-4ccd-4a1f-a1c1-a72eecc8d7b6
CVSS Score-4.8||MEDIUM
EPSS-0.01% / 0.25%
||
7 Day CHG~0.00%
Published-04 Feb, 2026 | 09:14
Updated-04 Feb, 2026 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unredacted data exposure in query.log

Neo4j Enterprise and Community editions versions prior to 2026.01.3 and 5.26.21 are vulnerable to a potential information disclosure by a user who has ability to access the local log files. The "obfuscate_literals" option in the query logs does not redact error information, exposing unredacted data in the query log when a customer writes a query that fails. It can allow a user with legitimate access to the local log files to obtain information they are not authorised to see. If this user is also in a position to run queries and trigger errors, this vulnerability can potentially help them to infer information they are not authorised to see through their intended database access. We recommend upgrading to versions 2026.01.3 (or 5.26.21) where the issue is fixed, and reviewing query log files permissions to ensure restricted access. If your configuration had db.logs.query.obfuscate_literals enabled, and you wish the obfuscation to cover the error messages as well, you need to enable the new configuration setting db.logs.query.obfuscate_errors once you have upgraded Neo4j.

Action-Not Available
Vendor-neo4j
Product-Enterprise EditionCommunity Edition
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2025-12738
Assigner-3b236295-4ccd-4a1f-a1c1-a72eecc8d7b6
ShareView Details
Assigner-3b236295-4ccd-4a1f-a1c1-a72eecc8d7b6
CVSS Score-1.3||LOW
EPSS-0.05% / 14.52%
||
7 Day CHG~0.00%
Published-22 Jan, 2026 | 13:29
Updated-26 Jan, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Enumeration of restricted property value

Neo4j Enterprise edition versions prior to 2025.11.2 and 5.26.17 are vulnerable to a potential information disclosure by an attacker who has some legitimate access to the database. The vulnerability allows attacker without read access to a property to infer information about its value by trying to enumerate all possible values through observing error messages of SET property. We recommend upgrading to 2025.11.2 or 5.26.17 and above, where the issues is fixed.

Action-Not Available
Vendor-neo4j
Product-Enterprise Edition
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2025-11602
Assigner-3b236295-4ccd-4a1f-a1c1-a72eecc8d7b6
ShareView Details
Assigner-3b236295-4ccd-4a1f-a1c1-a72eecc8d7b6
CVSS Score-6.3||MEDIUM
EPSS-0.06% / 19.66%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 10:20
Updated-04 Nov, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Untargeted information leak in Bolt protocol handshake

Potential information leak in bolt protocol handshake in Neo4j Enterprise and Community editions allows attacker to obtain one byte of information from previous connections. The attacker has no control over the information leaked in server responses.

Action-Not Available
Vendor-neo4j
Product-Community EditionEnterprise Edition
CWE ID-CWE-226
Sensitive Information in Resource Not Removed Before Reuse