Insufficient escaping of unicode characters in query log in Neo4j Enterprise and Community editions prior to 2026.01 can lead to XSS if the user opens the logs in a tool that treats them as HTML. There is no security impact on Neo4j products, but this advisory is released as a precaution to treat the logs as plain text if using versions prior to 2026.01.
Proof of concept exploit: https://github.com/JoakimBulow/CVE-2026-1337
References
| Link | Resource |
|---|---|
| https://github.com/JoakimBulow/CVE-2026-1337 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
24 Feb 2026, 21:21
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Neo4j neo4j
Neo4j |
|
| CPE | cpe:2.3:a:neo4j:neo4j:*:*:*:*:enterprise:*:*:* cpe:2.3:a:neo4j:neo4j:*:*:*:*:community:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
| References | () https://github.com/JoakimBulow/CVE-2026-1337 - Exploit, Third Party Advisory |
06 Feb 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-06 14:16
Updated : 2026-02-24 21:21
NVD link : CVE-2026-1337
Mitre link : CVE-2026-1337
CVE.ORG link : CVE-2026-1337
JSON object : View
Products Affected
neo4j
- neo4j
CWE
CWE-117
Improper Output Neutralization for Logs
