Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1524: CWE-863 Incorrect Authorization in neo4j Enterprise Edition

0
Low
VulnerabilityCVE-2026-1524cvecve-2026-1524cwe-863cwe-287
Published: Wed Mar 11 2026 (03/11/2026, 16:16:35 UTC)
Source: CVE Database V5
Vendor/Project: neo4j
Product: Enterprise Edition

Description

An edgecase in SSO implementation in Neo4j Enterprise edition versions prior to version 2026.02 can lead to unauthorised access under the following conditions: If a neo4j admin configures two or more OIDC providers AND configures one or more of them to be an authorization provider AND configures one or more of them to be authentication-only, then those that are authentication-only will also provide authorization. This edgecase becomes a security problem only if the authentication-only provider contains groups which have higher privileges than provided by the intended (configured) authorization provider. When using multiple plugins for authentication and authorisation, prior to the fix the issue could lead to a plugin configured to provide only authentication or authorisation capabilities erroneously providing both capabilities.  We recommend upgrading to versions 2026.02 (or 5.26.22) where the issue is fixed.

AI-Powered Analysis

AILast updated: 03/11/2026, 16:46:34 UTC

Technical Analysis

CVE-2026-1524 identifies an incorrect authorization vulnerability (CWE-863) in the Neo4j Enterprise Edition's SSO implementation affecting versions prior to 2026.02. The flaw occurs when an administrator configures two or more OpenID Connect (OIDC) providers, assigning some as authorization providers and others as authentication-only. In this scenario, the authentication-only providers inadvertently also provide authorization capabilities. This misbehavior becomes a security risk if the authentication-only provider contains groups with higher privileges than those granted by the intended authorization provider. The root cause is a logic error in handling multiple plugins for authentication and authorization, where the system fails to properly segregate authentication-only plugins from authorization functions. The vulnerability requires administrative privileges to configure the OIDC providers in this specific manner, and no user interaction is needed to exploit it. The CVSS 4.0 score is 2.1, reflecting low severity due to the complexity of exploitation and limited impact scope. The issue is resolved in Neo4j version 2026.02 (also referenced as 5.26.22). No public exploits have been reported, indicating limited active threat. This vulnerability highlights the importance of careful configuration and segregation of authentication and authorization roles in multi-provider SSO environments.

Potential Impact

The primary impact of CVE-2026-1524 is unauthorized privilege escalation within Neo4j Enterprise Edition environments using multiple OIDC providers. If exploited, users authenticated via an authentication-only provider could gain higher privileges than intended, potentially accessing or modifying sensitive graph data beyond their authorization scope. This could lead to data confidentiality breaches, unauthorized data manipulation, and potential disruption of database integrity. However, exploitation requires complex administrative misconfiguration, limiting the likelihood and scope of attacks. Organizations relying on Neo4j for critical data analytics, identity management, or infrastructure could face risks of insider threats or misconfigured access controls being exploited. Since Neo4j is used globally in sectors such as finance, telecommunications, and government, the vulnerability could impact sensitive systems if left unpatched. The absence of known exploits and the low CVSS score suggest limited immediate risk, but the potential for privilege escalation warrants timely remediation to maintain secure access controls.

Mitigation Recommendations

To mitigate CVE-2026-1524, organizations should upgrade Neo4j Enterprise Edition to version 2026.02 or later (or 5.26.22), where the vulnerability is fixed. Administrators should audit their OIDC provider configurations to ensure that providers designated as authentication-only do not inadvertently grant authorization privileges. Avoid configuring multiple OIDC providers with overlapping or conflicting roles unless necessary, and verify group privilege assignments carefully to prevent privilege escalation. Implement strict change management and configuration review processes for SSO setups. Additionally, monitor Neo4j access logs for unusual privilege escalations or access patterns. Employ role-based access controls (RBAC) and least privilege principles to minimize the impact of any misconfiguration. Finally, maintain up-to-date backups and test recovery procedures to mitigate potential data integrity issues arising from unauthorized access.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Neo4j
Date Reserved
2026-01-28T11:20:54.690Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b1988f2f860ef9433d150f

Added to database: 3/11/2026, 4:30:07 PM

Last enriched: 3/11/2026, 4:46:34 PM

Last updated: 3/13/2026, 7:35:11 PM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses