Proof of concept exploit: https://github.com/JoakimBulow/CVE-2026-1337
Project Subscriptions
No data.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xr72-g735-4vwp | Neo4j Enterprise and Community editions have insufficient escaping of unicode characters in query log |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://github.com/JoakimBulow/CVE-2026-1337 |
|
Fri, 06 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Feb 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Insufficient escaping of unicode characters in query log in Neo4j Enterprise and Community editions prior to 2026.01 can lead to XSS if the user opens the logs in a tool that treats them as HTML. There is no security impact on Neo4j products, but this advisory is released as a precaution to treat the logs as plain text if using versions prior to 2026.01. Proof of concept exploit: https://github.com/JoakimBulow/CVE-2026-1337 | |
| Title | Insufficient escaping of unicode characters in query log | |
| Weaknesses | CWE-117 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Neo4j
Published:
Updated: 2026-02-06T14:30:29.856Z
Reserved: 2026-01-22T13:14:55.461Z
Link: CVE-2026-1337
Updated: 2026-02-06T14:30:21.922Z
Status : Awaiting Analysis
Published: 2026-02-06T14:16:38.120
Modified: 2026-02-06T15:14:47.703
Link: CVE-2026-1337
No data.
OpenCVE Enrichment
No data.
Github GHSA