Description
Excessive caching of authentication context in Neo4j Enterprise edition versions prior to 2026.01.4 leads to authenticated users inheriting the context of the first user who authenticated after restart. The issue is limited to certain non-default configurations of SSO (UserInfo endpoint). 
We recommend upgrading to versions 2026.01.4 (or 5.26.22) where the issue is fixed.
Published: 2026-03-11
Score: 2.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Patch
AI Analysis

Impact

Neo4j Enterprise Edition has a flaw where an authenticated user can inherit the authentication context of the first user who logs in after a server restart. Key detail from vendor description: "Excessive caching of authentication context… leads to authenticated users inheriting the context of the first user who authenticated after restart." The vulnerability is classified as CWE-488 (Improper Cache Management) and CWE-863 (Incorrect Permission Management), indicating that cached authentication data can be reused incorrectly and that permission checks are not properly enforced, which may allow an attacker to gain higher privileges than intended.

Affected Systems

The issue affects Neo4j Enterprise Edition prior to version 2026.01.4 (or 5.26.22). It is active only when non-default SSO (UserInfo endpoint) configurations are in use, such that the server caches the first authenticated user’s context. All affected installations matching these criteria are potentially impacted until the software is upgraded.

Risk and Exploitability

The CVSS score of 2.1 indicates low severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is inferred from the description: the attacker must be authenticated, wait until a restart occurs, and then log in first after the restart to inherit the privileged context of that session. Because this requires specific timing and logged‑in status, the overall risk remains low under normal operational conditions, though the potential impact of privilege escalation is significant if an attacker succeeds.

Generated by OpenCVE AI on March 17, 2026 at 15:28 UTC.

Remediation

Vendor Workaround

Set dbms.security.oidc.<provider>.get_groups_from_user_info and dbms.security.oidc.<provider>.get_username_from_user_info to false.


OpenCVE Recommended Actions

  • Upgrade Neo4j Enterprise Edition to version 2026.01.4 or later (5.26.22 or newer).
  • If upgrading is not immediately possible, disable context inheritance for non‑default SSO by setting dbms.security.oidc.<provider>.get_groups_from_user_info and dbms.security.oidc.<provider>.get_username_from_user_info to false.

Generated by OpenCVE AI on March 17, 2026 at 15:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-488
References
Metrics threat_severity

None

cvssV3_1

{'score': 4.2, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}

threat_severity

Low


Wed, 11 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
Description Excessive caching of authentication context in Neo4j Enterprise edition versions prior to 2026.01.4 leads to authenticated users inheriting the context of the first user who authenticated after restart. The issue is limited to certain non-default configurations of SSO (UserInfo endpoint).  We recommend upgrading to versions 2026.01.4 (or 5.26.22) where the issue is fixed.
Title Caching of authentication context
First Time appeared Neo4j
Neo4j enterprise Edition
Weaknesses CWE-863
CPEs cpe:2.3:a:neo4j:enterprise_edition:*:*:*:*:*:*:*:*
Vendors & Products Neo4j
Neo4j enterprise Edition
References
Metrics cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/AU:N/R:U/V:D/RE:L/U:Clear'}


Subscriptions

Neo4j Enterprise Edition
cve-icon MITRE

Status: PUBLISHED

Assigner: Neo4j

Published:

Updated: 2026-03-11T20:09:18.652Z

Reserved: 2026-01-27T09:09:22.753Z

Link: CVE-2026-1471

cve-icon Vulnrichment

Updated: 2026-03-11T20:08:55.401Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-11T17:16:54.160

Modified: 2026-03-12T21:08:22.643

Link: CVE-2026-1471

cve-icon Redhat

Severity : Low

Publid Date: 2026-03-11T16:30:24Z

Links: CVE-2026-1471 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:30:33Z

Weaknesses