Potential information leak in bolt protocol handshake in Neo4j Enterprise and Community editions allows attacker to obtain one byte of information from previous connections. The attacker has no control over the information leaked in server responses.
PUBLISHED5.2CWE-226
Untargeted information leak in Bolt protocol handshake
Problem type
Affected products
neo4j
Enterprise Edition
< 5.26.15 - AFFECTED
< 2025.10.1 - AFFECTED
Community Edition
< 5.26.15 - AFFECTED
< 2025.10.1 - AFFECTED
References
JSON source
Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2025-11602",
"assignerOrgId": "3b236295-4ccd-4a1f-a1c1-a72eecc8d7b6",
"assignerShortName": "Neo4j",
"dateUpdated": "2025-10-31T11:37:44.777Z",
"dateReserved": "2025-10-10T12:54:22.071Z",
"datePublished": "2025-10-31T10:20:17.254Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "3b236295-4ccd-4a1f-a1c1-a72eecc8d7b6",
"shortName": "Neo4j",
"dateUpdated": "2025-10-31T10:20:17.254Z"
},
"title": "Untargeted information leak in Bolt protocol handshake",
"descriptions": [
{
"lang": "en",
"value": "Potential information leak in bolt protocol handshake in Neo4j Enterprise and Community editions allows attacker to obtain one byte of information from previous connections. The attacker has no control over the information leaked in server responses.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "Potential information leak in bolt protocol handshake in Neo4j Enterprise and Community editions allows attacker to obtain one byte of information from previous connections. The attacker has no control over the information leaked in server responses.<br><br>"
}
]
}
],
"affected": [
{
"vendor": "neo4j",
"product": "Enterprise Edition",
"defaultStatus": "unaffected",
"versions": [
{
"version": "5.26.0",
"status": "affected",
"versionType": "semver",
"lessThan": "5.26.15"
},
{
"version": "2025.1.0",
"status": "affected",
"versionType": "semver",
"lessThan": "2025.10.1"
}
]
},
{
"vendor": "neo4j",
"product": "Community Edition",
"collectionURL": "https://mvnrepository.com/artifact/org.neo4j/",
"packageName": "neo4j",
"repo": "https://github.com/neo4j/neo4j",
"defaultStatus": "unaffected",
"versions": [
{
"version": "5.26.0",
"status": "affected",
"versionType": "semver",
"lessThan": "5.26.15"
},
{
"version": "2025.1.0",
"status": "affected",
"versionType": "semver",
"lessThan": "2025.10.1"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-226: Sensitive Information in Resource Not Removed Before Reuse",
"cweId": "CWE-226",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://neo4j.com/security/cve-2025-11602",
"tags": [
"vendor-advisory"
]
}
],
"impacts": [
{
"capecId": "CAPEC-410",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-410 Information Elicitation"
}
]
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2025-10-31T11:37:44.777Z"
},
"title": "CISA ADP Vulnrichment",
"metrics": [
{}
]
}
]
}
}