We recommend upgrading to versions 2026.01.4 (or 5.26.22) where the issue is fixed.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Set dbms.security.oidc.<provider>.get_groups_from_user_info and dbms.security.oidc.<provider>.get_username_from_user_info to false.
| Link | Providers |
|---|---|
| https://neo4j.com/security/CVE-2026-1471 |
|
Wed, 11 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Mar 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Excessive caching of authentication context in Neo4j Enterprise edition versions prior to 2026.01.4 leads to authenticated users inheriting the context of the first user who authenticated after restart. The issue is limited to certain non-default configurations of SSO (UserInfo endpoint). We recommend upgrading to versions 2026.01.4 (or 5.26.22) where the issue is fixed. | |
| Title | Caching of authentication context | |
| First Time appeared |
Neo4j
Neo4j enterprise Edition |
|
| Weaknesses | CWE-863 | |
| CPEs | cpe:2.3:a:neo4j:enterprise_edition:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Neo4j
Neo4j enterprise Edition |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Neo4j
Published:
Updated: 2026-03-11T20:09:18.652Z
Reserved: 2026-01-27T09:09:22.753Z
Link: CVE-2026-1471
Updated: 2026-03-11T20:08:55.401Z
Status : Received
Published: 2026-03-11T17:16:54.160
Modified: 2026-03-11T17:16:54.160
Link: CVE-2026-1471
No data.
OpenCVE Enrichment
No data.