CVE-2026-1497: CWE-863 Incorrect Authorization in neo4j Enterprise Edition
Incorrect resolving of namespaces in composite databases in Neo4j Enterprise edition prior to versions 2026.02 and 5.26.22 can lead to the following scenario: an admin that intends to give a user an access to a remote database constituent "namespace.name" will inadvertently grant access to any local database or remote alias called "name". If such database or alias doesn't exist when the command is run, the privileges will apply if it's created in the future.
AI Analysis
Technical Summary
CVE-2026-1497 is a security vulnerability classified under CWE-863 (Incorrect Authorization) affecting Neo4j Enterprise Edition versions prior to 2026.02 and 5.26.22. The issue stems from improper handling of namespaces within composite databases. When an administrator attempts to grant a user access to a remote database constituent identified as "namespace.name", the system incorrectly resolves the namespace and instead grants access to any local database or remote alias named "name". This misauthorization can lead to unintended privilege escalation, as the user gains access to databases or aliases not originally intended. Furthermore, if the targeted database or alias does not exist at the time of the access grant, the privileges will apply retroactively if such a database or alias is created later. This behavior can result in persistent unauthorized access. The vulnerability requires an administrator with limited privileges to execute the grant command and some user interaction, but does not require bypassing authentication mechanisms. The CVSS 4.0 vector indicates network attack vector, low attack complexity, partial privileges required, user interaction needed, and low impact on confidentiality, integrity, and availability, culminating in a low severity rating. No public exploits have been reported, and no patches are linked in the provided data, though upgrading to versions 2026.02 or 5.26.22 is implied as the remediation path.
Potential Impact
The primary impact of CVE-2026-1497 is unauthorized access to databases or aliases within Neo4j composite database environments. This can lead to privilege escalation where users gain access to sensitive data or perform unauthorized operations on databases they should not access. The retroactive application of privileges to databases created after the grant increases the risk of persistent unauthorized access, potentially compromising data confidentiality and integrity. However, the impact is somewhat limited by the requirement that an administrator with some privileges perform the access grant, and that user interaction is needed. The vulnerability does not allow remote code execution or denial of service directly. Organizations relying on Neo4j Enterprise Edition for critical data storage and analytics could face data leakage or compliance violations if this vulnerability is exploited. The low CVSS score reflects the limited scope and complexity, but the risk remains significant in environments with complex composite database setups and multiple aliases.
Mitigation Recommendations
To mitigate CVE-2026-1497, organizations should upgrade Neo4j Enterprise Edition to versions 2026.02 or 5.26.22 or later, where the namespace resolution issue is fixed. Until upgrades are applied, administrators should exercise caution when granting access to remote database constituents, explicitly verifying the existence and naming of local databases and aliases to avoid unintended privilege grants. Implement strict access control policies limiting which administrators can grant database access, and audit all privilege grants for anomalies. Monitoring for creation of new databases or aliases that could inherit unintended privileges is recommended. Additionally, consider isolating sensitive databases to minimize the risk of privilege escalation through namespace confusion. Regularly review Neo4j security advisories for updates or patches addressing this and related vulnerabilities.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Australia, Canada, Netherlands, Sweden
CVE-2026-1497: CWE-863 Incorrect Authorization in neo4j Enterprise Edition
Description
Incorrect resolving of namespaces in composite databases in Neo4j Enterprise edition prior to versions 2026.02 and 5.26.22 can lead to the following scenario: an admin that intends to give a user an access to a remote database constituent "namespace.name" will inadvertently grant access to any local database or remote alias called "name". If such database or alias doesn't exist when the command is run, the privileges will apply if it's created in the future.
AI-Powered Analysis
Technical Analysis
CVE-2026-1497 is a security vulnerability classified under CWE-863 (Incorrect Authorization) affecting Neo4j Enterprise Edition versions prior to 2026.02 and 5.26.22. The issue stems from improper handling of namespaces within composite databases. When an administrator attempts to grant a user access to a remote database constituent identified as "namespace.name", the system incorrectly resolves the namespace and instead grants access to any local database or remote alias named "name". This misauthorization can lead to unintended privilege escalation, as the user gains access to databases or aliases not originally intended. Furthermore, if the targeted database or alias does not exist at the time of the access grant, the privileges will apply retroactively if such a database or alias is created later. This behavior can result in persistent unauthorized access. The vulnerability requires an administrator with limited privileges to execute the grant command and some user interaction, but does not require bypassing authentication mechanisms. The CVSS 4.0 vector indicates network attack vector, low attack complexity, partial privileges required, user interaction needed, and low impact on confidentiality, integrity, and availability, culminating in a low severity rating. No public exploits have been reported, and no patches are linked in the provided data, though upgrading to versions 2026.02 or 5.26.22 is implied as the remediation path.
Potential Impact
The primary impact of CVE-2026-1497 is unauthorized access to databases or aliases within Neo4j composite database environments. This can lead to privilege escalation where users gain access to sensitive data or perform unauthorized operations on databases they should not access. The retroactive application of privileges to databases created after the grant increases the risk of persistent unauthorized access, potentially compromising data confidentiality and integrity. However, the impact is somewhat limited by the requirement that an administrator with some privileges perform the access grant, and that user interaction is needed. The vulnerability does not allow remote code execution or denial of service directly. Organizations relying on Neo4j Enterprise Edition for critical data storage and analytics could face data leakage or compliance violations if this vulnerability is exploited. The low CVSS score reflects the limited scope and complexity, but the risk remains significant in environments with complex composite database setups and multiple aliases.
Mitigation Recommendations
To mitigate CVE-2026-1497, organizations should upgrade Neo4j Enterprise Edition to versions 2026.02 or 5.26.22 or later, where the namespace resolution issue is fixed. Until upgrades are applied, administrators should exercise caution when granting access to remote database constituents, explicitly verifying the existence and naming of local databases and aliases to avoid unintended privilege grants. Implement strict access control policies limiting which administrators can grant database access, and audit all privilege grants for anomalies. Monitoring for creation of new databases or aliases that could inherit unintended privileges is recommended. Additionally, consider isolating sensitive databases to minimize the risk of privilege escalation through namespace confusion. Regularly review Neo4j security advisories for updates or patches addressing this and related vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Neo4j
- Date Reserved
- 2026-01-27T15:57:15.975Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69b194fa2f860ef943342463
Added to database: 3/11/2026, 4:14:50 PM
Last enriched: 3/11/2026, 4:30:29 PM
Last updated: 3/13/2026, 5:30:59 PM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.