A newly disclosed set of ITSM vulnerabilities in Ivanti Neurons has been reported. The flaws could allow attackers to retain access to enterprise systems under certain conditions. The issues, tracked as CVE-2026-4913 and CVE-2026-4914, affect Ivanti’s Neurons for IT Service Management (ITSM) platform.
Ivanti recently published the security advisory outlining these two vulnerabilities. These flaws could enable remote authenticated attackers to hijack or persist in user sessions, potentially maintaining unauthorized access even after administrative actions such as account deactivation.
The vulnerabilities affect both on-premises and cloud deployments running version 2025.3 and earlier. While the risks are notable, Ivanti stated that, at the time of disclosure on April 14, 2026, there is no evidence to suggest active exploitation in real-world attacks.
In its advisory, the company noted: “We are not aware of any customers being exploited by these vulnerabilities at the time of disclosure.” The vulnerabilities were identified and reported through a responsible disclosure program.
The two vulnerabilities, CVE-2026-4913 and CVE-2026-4914, have distinct behaviors but share a reliance on some level of authenticated access or user interaction.
The first flaw, CVE-2026-4913, is classified as an “improper protection of an alternate path” vulnerability (CWE-424). It affects Ivanti Neurons for ITSM versions prior to 2025.4 and carries a CVSS score of 5.7 (Medium), with the vector:
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N.
This vulnerability allows a remote authenticated attacker to retain access to the system even after their account has been disabled. In practice, this could enable a user with previously valid credentials to continue interacting with the platform through an alternate access path, bypassing expected session termination controls.
The second issue, CVE-2026-4914, is a stored cross-site scripting (XSS) vulnerability (CWE-79) with a CVSS score of 5.4 (Medium). Its vector is:
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N.
This flaw allows a remote authenticated attacker to inject malicious scripts that may execute in another user’s session, provided user interaction occurs. Successful exploitation could result in limited information disclosure from other sessions, posing a risk to sensitive operational data within the ITSM environment.
Both vulnerabilities impact Ivanti Neurons for ITSM version 2025.3 and earlier across deployment models:
The patched release, version 2025.4, addresses both CVE-2026-4913 and CVE-2026-4914.
To reduce exposure to these vulnerabilities, Ivanti recommends that organizations update their systems to version 2025.4 as soon as possible. The mitigation steps differ depending on the deployment type.
For cloud customers using Ivanti Neurons, no action is required, as the company has already implemented the necessary fixes across hosted environments. This proactive update ensures that cloud users are protected against both CVE-2026-4913 and CVE-2026-4914.
In contrast, organizations running on-premises deployments must take manual action. Administrators and security teams are advised to log into the Ivanti License System and apply the 2025.4 update without delay.
At present, Ivanti has not identified any indicators of compromise associated with these vulnerabilities, largely due to the absence of known exploitation. As a result, organizations may not have specific forensic markers to determine whether their systems were targeted.
For organizations requiring assistance, Ivanti recommends submitting a support request through its Success Portal to address any concerns related to Ivanti Neurons, CVE-2026-4913, or CVE-2026-4914.