Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1622: CWE-532 Insertion of Sensitive Information into Log File in neo4j Enterprise Edition

0
Medium
VulnerabilityCVE-2026-1622cvecve-2026-1622cwe-532
Published: Wed Feb 04 2026 (02/04/2026, 09:14:46 UTC)
Source: CVE Database V5
Vendor/Project: neo4j
Product: Enterprise Edition

Description

CVE-2026-1622 is a medium severity vulnerability in Neo4j Enterprise and Community editions prior to versions 2026. 01. 3 and 5. 26. 21. It involves the insertion of sensitive information into query log files due to incomplete obfuscation of error messages when the 'obfuscate_literals' option is enabled. A user with legitimate access to local log files and the ability to run queries that trigger errors can infer unauthorized information from unredacted error details. The vulnerability does not require user interaction but does require local log file access and some privileges to run queries. The issue is fixed in the specified patched versions, and a new configuration option 'db. logs.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 12:09:33 UTC

Technical Analysis

CVE-2026-1622 affects Neo4j Enterprise and Community editions before versions 2026.01.3 and 5.26.21. The vulnerability stems from the 'obfuscate_literals' setting in Neo4j's query logging mechanism, which is intended to redact sensitive literals from query logs. However, this setting does not obfuscate error messages generated by failed queries, resulting in sensitive data being written unredacted into local log files. An attacker with legitimate access to these log files and the ability to execute queries that cause errors can exploit this to glean sensitive information beyond their authorized access. This is a form of information disclosure classified under CWE-532 (Insertion of Sensitive Information into Log File). The vulnerability requires local access to log files and privileges to run queries but does not require user interaction or network access. The CVSS 4.0 score is 4.8 (medium), reflecting limited attack vector (local), low complexity, and partial confidentiality impact. The vendor has addressed the issue by releasing patched versions and introducing a new configuration option 'db.logs.query.obfuscate_errors' to extend obfuscation to error messages. Proper permissions on log files are also recommended to limit exposure.

Potential Impact

For European organizations using Neo4j databases, this vulnerability could lead to unauthorized disclosure of sensitive information through local log files. Attackers with legitimate access to the system and query execution rights could infer confidential data by analyzing error logs, potentially exposing business-critical or personal data. This risk is particularly relevant for sectors handling sensitive data such as finance, healthcare, and government agencies. Although the vulnerability requires local access and some privileges, insider threats or attackers who have gained limited access could exploit it to escalate information exposure. This could undermine compliance with GDPR and other data protection regulations due to unauthorized data disclosure. Additionally, the exposure of sensitive query data could assist attackers in crafting further attacks or gaining deeper insight into the database structure and contents.

Mitigation Recommendations

European organizations should immediately upgrade Neo4j installations to versions 2026.01.3 or 5.26.21 or later, where this vulnerability is fixed. After upgrading, enable the new configuration setting 'db.logs.query.obfuscate_errors' to ensure error messages are also obfuscated in logs. Review and tighten permissions on local log files to restrict access strictly to authorized personnel and processes. Implement monitoring and alerting on log file access to detect unauthorized attempts. Limit the number of users who can execute queries that may generate errors and review user privileges regularly. Consider isolating Neo4j instances and logs on secure, access-controlled systems to reduce insider threat risks. Conduct audits of existing logs to identify any potential data leakage prior to patching. Finally, integrate these practices into the organization's security policy and incident response plans.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Neo4j
Date Reserved
2026-01-29T14:23:26.871Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698311a1f9fa50a62f7d02dc

Added to database: 2/4/2026, 9:30:09 AM

Last enriched: 2/11/2026, 12:09:33 PM

Last updated: 3/21/2026, 10:00:51 PM

Views: 126

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses