Impact
Neo4j Enterprise and Community editions prior to versions 2026.01.3 and 5.26.21 can log and expose sensitive data in query error messages when the db.logs.query.obfuscate_literals configuration is enabled. Because the error logs are not obfuscated, a user who can read the local log files obtains information not intended to be visible, potentially revealing private data such as password hashes or internal entity identifiers. The vulnerability is a classic information exposure through log files and could compromise confidentiality of database contents.
Affected Systems
Neo4j Community Edition and Enterprise Edition versions earlier than 2026.01.3 (for Enterprise) and 5.26.21 (for Community). Users of these releases with local access to query.log files are affected.
Risk and Exploitability
The CVSS score of 4.8 indicates moderate impact. The EPSS probability is below 1%, and the vulnerability is not listed in the CISA KEV catalog, suggesting limited automation presence. The attack requires a user who can read the server's query logs and also perform database queries that trigger errors. If both conditions are met, the user can infer information they are not authorized to see through the unredacted error logs.
OpenCVE Enrichment
Github GHSA