CVE-2025-12738: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in neo4j Enterprise Edition
Neo4j Enterprise edition versions prior to 2025.11.2 and 5.26.17 are vulnerable to a potential information disclosure by an attacker who has some legitimate access to the database. The vulnerability allows attacker without read access to a property to infer information about its value by trying to enumerate all possible values through observing error messages of SET property. We recommend upgrading to 2025.11.2 or 5.26.17 and above, where the issues is fixed.
AI Analysis
Technical Summary
CVE-2025-12738 is an information disclosure vulnerability classified under CWE-200 that affects Neo4j Enterprise Edition versions prior to 2025.11.2 and 5.26.17. The flaw arises because an attacker who has some level of legitimate access to the database, but lacks read permissions on specific properties, can still infer the values of those properties. This is achieved by attempting to SET the property to various values and observing the resulting error messages, which leak information about the correctness or existence of those values. The vulnerability exploits the way error messages are generated and returned during property modification attempts, effectively allowing an attacker to enumerate possible property values without direct read access. This side-channel information leak can expose sensitive data that should otherwise be protected. The vulnerability does not require user interaction and can be exploited remotely if the attacker has authenticated access with limited privileges. The CVSS 4.0 base score is 1.3, reflecting low severity due to the limited scope and impact. No known exploits have been reported in the wild, and the vendor has addressed the issue in versions 2025.11.2 and 5.26.17. Organizations using affected versions should upgrade promptly to prevent potential information leakage.
Potential Impact
For European organizations, the primary impact of this vulnerability is unauthorized disclosure of sensitive information stored in Neo4j databases. Although the attacker must have some legitimate access, the ability to infer property values without direct read permissions undermines data confidentiality controls. This could lead to exposure of personal data, intellectual property, or other confidential business information, potentially violating GDPR and other data protection regulations. The vulnerability does not affect data integrity or availability, so operational disruption is unlikely. However, the confidentiality breach could facilitate further attacks or insider threats. Sectors such as finance, telecommunications, healthcare, and government agencies in Europe that use Neo4j for complex data relationships and analytics are particularly at risk. The low severity score suggests limited immediate risk, but the sensitivity of exposed data and regulatory implications elevate the importance of mitigation.
Mitigation Recommendations
1. Upgrade Neo4j Enterprise Edition to version 2025.11.2 or 5.26.17 or later, where the vulnerability is fixed. 2. Review and tighten database access controls to minimize the number of users with any level of access, especially those with write permissions that could be exploited for enumeration. 3. Implement monitoring and alerting for unusual SET property operations or repeated failed attempts that could indicate enumeration activity. 4. Consider application-layer controls to limit the exposure of detailed error messages to authenticated users, potentially customizing error handling to avoid leaking sensitive information. 5. Conduct regular audits of database permissions and logs to detect potential misuse. 6. Educate database administrators and developers about the risks of information leakage through error messages and encourage secure coding and configuration practices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Norway, Switzerland, Italy, Spain
CVE-2025-12738: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in neo4j Enterprise Edition
Description
Neo4j Enterprise edition versions prior to 2025.11.2 and 5.26.17 are vulnerable to a potential information disclosure by an attacker who has some legitimate access to the database. The vulnerability allows attacker without read access to a property to infer information about its value by trying to enumerate all possible values through observing error messages of SET property. We recommend upgrading to 2025.11.2 or 5.26.17 and above, where the issues is fixed.
AI-Powered Analysis
Technical Analysis
CVE-2025-12738 is an information disclosure vulnerability classified under CWE-200 that affects Neo4j Enterprise Edition versions prior to 2025.11.2 and 5.26.17. The flaw arises because an attacker who has some level of legitimate access to the database, but lacks read permissions on specific properties, can still infer the values of those properties. This is achieved by attempting to SET the property to various values and observing the resulting error messages, which leak information about the correctness or existence of those values. The vulnerability exploits the way error messages are generated and returned during property modification attempts, effectively allowing an attacker to enumerate possible property values without direct read access. This side-channel information leak can expose sensitive data that should otherwise be protected. The vulnerability does not require user interaction and can be exploited remotely if the attacker has authenticated access with limited privileges. The CVSS 4.0 base score is 1.3, reflecting low severity due to the limited scope and impact. No known exploits have been reported in the wild, and the vendor has addressed the issue in versions 2025.11.2 and 5.26.17. Organizations using affected versions should upgrade promptly to prevent potential information leakage.
Potential Impact
For European organizations, the primary impact of this vulnerability is unauthorized disclosure of sensitive information stored in Neo4j databases. Although the attacker must have some legitimate access, the ability to infer property values without direct read permissions undermines data confidentiality controls. This could lead to exposure of personal data, intellectual property, or other confidential business information, potentially violating GDPR and other data protection regulations. The vulnerability does not affect data integrity or availability, so operational disruption is unlikely. However, the confidentiality breach could facilitate further attacks or insider threats. Sectors such as finance, telecommunications, healthcare, and government agencies in Europe that use Neo4j for complex data relationships and analytics are particularly at risk. The low severity score suggests limited immediate risk, but the sensitivity of exposed data and regulatory implications elevate the importance of mitigation.
Mitigation Recommendations
1. Upgrade Neo4j Enterprise Edition to version 2025.11.2 or 5.26.17 or later, where the vulnerability is fixed. 2. Review and tighten database access controls to minimize the number of users with any level of access, especially those with write permissions that could be exploited for enumeration. 3. Implement monitoring and alerting for unusual SET property operations or repeated failed attempts that could indicate enumeration activity. 4. Consider application-layer controls to limit the exposure of detailed error messages to authenticated users, potentially customizing error handling to avoid leaking sensitive information. 5. Conduct regular audits of database permissions and logs to detect potential misuse. 6. Educate database administrators and developers about the risks of information leakage through error messages and encourage secure coding and configuration practices.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Neo4j
- Date Reserved
- 2025-11-05T08:56:50.124Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69722b404623b1157c72bdd2
Added to database: 1/22/2026, 1:50:56 PM
Last enriched: 1/22/2026, 2:05:30 PM
Last updated: 2/5/2026, 9:56:35 PM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1964: Improper Access Controls in WeKan
MediumCVE-2026-25815: CWE-1394 Use of Default Cryptographic Key in Fortinet FortiOS
LowCVE-2026-1963: Improper Access Controls in WeKan
MediumCVE-2025-15551: CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in TP-Link Systems Inc. Archer MR200 v5.2
MediumCVE-2026-1962: Improper Access Controls in WeKan
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.