Description
Incorrect resolving of namespaces in composite databases in Neo4j Enterprise edition prior to versions 2026.02 and 5.26.22 can lead to the following scenario: 
an admin that intends to give a user an access to a remote database constituent "namespace.name" will inadvertently grant access to any local database or remote alias called "name". If such database or alias doesn't exist when the command is run, the privileges will apply if it's created in the future.
Published: 2026-03-11
Score: 2 Low
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Assess Impact
AI Analysis

Impact

Neo4j Enterprise Edition includes a flaw in composite database handling where namespace resolution is incorrectly processed. When an administrator grants access to a remote database component identified by a fully–qualified name such as "namespace.name", the system may instead assign that privilege to any local database or remote alias that shares the suffix "name". This misassignment can give a user access to a database or alias that they should not have, constituting a privilege escalation scenario (CWE‑863). The impact is a potential loss of confidentiality and integrity for data stored in the incorrectly privileged databases.

Affected Systems

The vulnerability affects Neo4j Enterprise Edition releases prior to 2026.02 and 5.26.22. Any database instance using these versions that executes grant commands against composite database namespaces is susceptible. The affected component is the namespace resolution logic within the Neo4j composite database framework.

Risk and Exploitability

The CVSS score is 2, indicating low overall severity, and the EPSS score is below 1%, suggesting a low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an attacker to execute a privileged grant command—either directly as a database administrator or by compromising an administrative account. Based on the description, the likely attack vector is an admin‐initiated grant operation that inadvertently assigns privileges to an unintended database or alias. This inference is drawn from the necessity of having control over the grant mechanism.

Generated by OpenCVE AI on March 17, 2026 at 15:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify that the Neo4j Enterprise Edition version is 2026.02 or later, or 5.26.22 or later.
  • If running a vulnerable version, upgrade to a patched release as soon as possible.
  • Audit existing privilege grants for unintended access to local databases or aliases matching name suffixes.
  • Restrict administrative rights and enforce the principle of least privilege to contain potential exposure.

Generated by OpenCVE AI on March 17, 2026 at 15:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Thu, 12 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Description Incorrect resolving of namespaces in composite databases in Neo4j Enterprise edition prior to versions 2026.02 and 5.26.22 can lead to the following scenario:  an admin that intends to give a user an access to a remote database constituent "namespace.name" will inadvertently grant access to any local database or remote alias called "name". If such database or alias doesn't exist when the command is run, the privileges will apply if it's created in the future.
Title Incorrect privilege assignment in composite databases
First Time appeared Neo4j
Neo4j enterprise Edition
Weaknesses CWE-863
CPEs cpe:2.3:a:neo4j:enterprise_edition:*:*:*:*:*:*:*:*
Vendors & Products Neo4j
Neo4j enterprise Edition
References
Metrics cvssV4_0

{'score': 2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/AU:N/R:U/V:D/RE:M/U:Green'}


Subscriptions

Neo4j Enterprise Edition
cve-icon MITRE

Status: PUBLISHED

Assigner: Neo4j

Published:

Updated: 2026-03-12T16:13:58.620Z

Reserved: 2026-01-27T15:57:15.975Z

Link: CVE-2026-1497

cve-icon Vulnrichment

Updated: 2026-03-12T16:13:52.468Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-11T16:16:22.650

Modified: 2026-03-12T21:08:22.643

Link: CVE-2026-1497

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:30:53Z

Weaknesses