Excessive caching of authentication context in Neo4j Enterprise edition versions prior to 2026.01.4 leads to authenticated users inheriting the context of the first user who authenticated after restart. The issue is limited to certain non-default configurations of SSO (UserInfo endpoint).
We recommend upgrading to versions 2026.01.4 (or 5.26.22) where the issue is fixed.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://neo4j.com/security/CVE-2026-1471 |
|
History
Wed, 11 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Mar 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Excessive caching of authentication context in Neo4j Enterprise edition versions prior to 2026.01.4 leads to authenticated users inheriting the context of the first user who authenticated after restart. The issue is limited to certain non-default configurations of SSO (UserInfo endpoint). We recommend upgrading to versions 2026.01.4 (or 5.26.22) where the issue is fixed. | |
| Title | Caching of authentication context | |
| First Time appeared |
Neo4j
Neo4j enterprise Edition |
|
| Weaknesses | CWE-863 | |
| CPEs | cpe:2.3:a:neo4j:enterprise_edition:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Neo4j
Neo4j enterprise Edition |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Neo4j
Published: 2026-03-11T16:30:24.053Z
Updated: 2026-03-11T20:09:18.652Z
Reserved: 2026-01-27T09:09:22.753Z
Link: CVE-2026-1471
Updated: 2026-03-11T20:08:55.401Z
Status : Received
Published: 2026-03-11T17:16:54.160
Modified: 2026-03-11T17:16:54.160
Link: CVE-2026-1471
No data.