CVE-2026-1337

Insufficient escaping of unicode characters in query log in Neo4j Enterprise and Community editions prior to 2026.01 can lead to XSS if the user opens the logs in a tool that treats them as HTML. There is no security impact on Neo4j products, but this advisory is released as a precaution to treat the logs as plain text if using versions prior to 2026.01. Proof of concept exploit:  https://github.com/JoakimBulow/CVE-2026-1337
References
Link Resource
https://github.com/JoakimBulow/CVE-2026-1337 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:neo4j:neo4j:*:*:*:*:community:*:*:*
cpe:2.3:a:neo4j:neo4j:*:*:*:*:enterprise:*:*:*

History

24 Feb 2026, 21:21

Type Values Removed Values Added
First Time Neo4j neo4j
Neo4j
CPE cpe:2.3:a:neo4j:neo4j:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:neo4j:neo4j:*:*:*:*:community:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
References () https://github.com/JoakimBulow/CVE-2026-1337 - () https://github.com/JoakimBulow/CVE-2026-1337 - Exploit, Third Party Advisory

06 Feb 2026, 14:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-06 14:16

Updated : 2026-02-24 21:21


NVD link : CVE-2026-1337

Mitre link : CVE-2026-1337

CVE.ORG link : CVE-2026-1337


JSON object : View

Products Affected

neo4j

  • neo4j
CWE
CWE-117

Improper Output Neutralization for Logs