CVE-2026-25137: CWE-552: Files or Directories Accessible to External Parties in NixOS nixpkgs
The NixOs Odoo package is an open source ERP and CRM system. From 21.11 to before 25.11 and 26.05, every NixOS based Odoo setup publicly exposes the database manager without any authentication. This allows unauthorized actors to delete and download the entire database, including Odoos file store. Unauthorized access is evident from http requests. If kept, searching access logs and/or Odoos log for requests to /web/database can give indicators, if this has been actively exploited. The database manager is a featured intended for development and not meant to be publicly reachable. On other setups, a master password acts as 2nd line of defence. However, due to the nature of NixOS, Odoo is not able to modify its own configuration file and thus unable to persist the auto-generated password. This also applies when manually setting a master password in the web-UI. This means, the password is lost when restarting Odoo. When no password is set, the user is prompted to set one directly via the database manager. This requires no authentication or action by any authorized user or the system administrator. Thus, the database is effectively world readable by anyone able to reach Odoo. This vulnerability is fixed in 25.11 and 26.05.
AI Analysis
Technical Summary
CVE-2026-25137 is a critical security vulnerability in the NixOS nixpkgs distribution affecting the Odoo ERP/CRM package versions from 21.11 up to but not including 25.11 and 26.05. The core issue arises because the Odoo database manager interface, which is intended only for development use, is exposed publicly without any authentication mechanism. Normally, Odoo uses a master password as a second line of defense; however, due to the immutable nature of NixOS configurations, Odoo cannot persist the auto-generated master password or any manually set password across restarts. Consequently, after each restart, the database manager is left unprotected and accessible to anyone able to reach the Odoo service endpoint. This allows unauthorized actors to perform destructive actions such as deleting the entire database or downloading all stored data, including sensitive files. The vulnerability is evident from HTTP requests targeting the /web/database path, and defenders can search logs for such activity to identify potential exploitation. The flaw is classified under CWE-552 (Files or Directories Accessible to External Parties) and CWE-306 (Missing Authentication for Critical Function). The vulnerability has a CVSS v3.1 score of 9.1, reflecting its critical severity, with network attack vector, no required privileges or user interaction, and high impact on confidentiality and availability. The issue has been resolved in NixOS versions 25.11 and 26.05.
Potential Impact
For European organizations using NixOS with the affected Odoo package versions, this vulnerability poses a severe risk to business operations and data confidentiality. Unauthorized access to the database manager can lead to complete data exfiltration, including sensitive customer and business information stored within Odoo’s ERP and CRM modules. Additionally, attackers can delete the entire database, causing significant operational downtime and data loss. Given Odoo’s role in managing critical business processes, exploitation could disrupt supply chains, financial operations, and customer relationship management. The lack of authentication and ease of exploitation mean that any exposed Odoo instance on the internet is at immediate risk. This could also lead to regulatory compliance violations under GDPR due to unauthorized disclosure of personal data. The vulnerability’s impact on availability and confidentiality makes it a critical concern for European enterprises relying on NixOS-based Odoo deployments.
Mitigation Recommendations
European organizations should immediately verify if their Odoo deployments on NixOS are running affected versions (>=21.11 and <25.11). The primary mitigation is to upgrade to patched versions 25.11 or 26.05 where the issue is resolved. Until upgrades can be performed, organizations should restrict network access to the Odoo database manager interface by implementing firewall rules or network segmentation to prevent external access. Additionally, deploying reverse proxies with authentication or VPN access can help protect the interface. Monitoring HTTP access logs for requests to /web/database can help detect attempted exploitation. Organizations should also consider disabling the database manager interface in production environments or configuring Odoo to run in a mode that does not expose this interface externally. Finally, regular backups of Odoo databases should be maintained to enable recovery in case of data deletion.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain, Poland
CVE-2026-25137: CWE-552: Files or Directories Accessible to External Parties in NixOS nixpkgs
Description
The NixOs Odoo package is an open source ERP and CRM system. From 21.11 to before 25.11 and 26.05, every NixOS based Odoo setup publicly exposes the database manager without any authentication. This allows unauthorized actors to delete and download the entire database, including Odoos file store. Unauthorized access is evident from http requests. If kept, searching access logs and/or Odoos log for requests to /web/database can give indicators, if this has been actively exploited. The database manager is a featured intended for development and not meant to be publicly reachable. On other setups, a master password acts as 2nd line of defence. However, due to the nature of NixOS, Odoo is not able to modify its own configuration file and thus unable to persist the auto-generated password. This also applies when manually setting a master password in the web-UI. This means, the password is lost when restarting Odoo. When no password is set, the user is prompted to set one directly via the database manager. This requires no authentication or action by any authorized user or the system administrator. Thus, the database is effectively world readable by anyone able to reach Odoo. This vulnerability is fixed in 25.11 and 26.05.
AI-Powered Analysis
Technical Analysis
CVE-2026-25137 is a critical security vulnerability in the NixOS nixpkgs distribution affecting the Odoo ERP/CRM package versions from 21.11 up to but not including 25.11 and 26.05. The core issue arises because the Odoo database manager interface, which is intended only for development use, is exposed publicly without any authentication mechanism. Normally, Odoo uses a master password as a second line of defense; however, due to the immutable nature of NixOS configurations, Odoo cannot persist the auto-generated master password or any manually set password across restarts. Consequently, after each restart, the database manager is left unprotected and accessible to anyone able to reach the Odoo service endpoint. This allows unauthorized actors to perform destructive actions such as deleting the entire database or downloading all stored data, including sensitive files. The vulnerability is evident from HTTP requests targeting the /web/database path, and defenders can search logs for such activity to identify potential exploitation. The flaw is classified under CWE-552 (Files or Directories Accessible to External Parties) and CWE-306 (Missing Authentication for Critical Function). The vulnerability has a CVSS v3.1 score of 9.1, reflecting its critical severity, with network attack vector, no required privileges or user interaction, and high impact on confidentiality and availability. The issue has been resolved in NixOS versions 25.11 and 26.05.
Potential Impact
For European organizations using NixOS with the affected Odoo package versions, this vulnerability poses a severe risk to business operations and data confidentiality. Unauthorized access to the database manager can lead to complete data exfiltration, including sensitive customer and business information stored within Odoo’s ERP and CRM modules. Additionally, attackers can delete the entire database, causing significant operational downtime and data loss. Given Odoo’s role in managing critical business processes, exploitation could disrupt supply chains, financial operations, and customer relationship management. The lack of authentication and ease of exploitation mean that any exposed Odoo instance on the internet is at immediate risk. This could also lead to regulatory compliance violations under GDPR due to unauthorized disclosure of personal data. The vulnerability’s impact on availability and confidentiality makes it a critical concern for European enterprises relying on NixOS-based Odoo deployments.
Mitigation Recommendations
European organizations should immediately verify if their Odoo deployments on NixOS are running affected versions (>=21.11 and <25.11). The primary mitigation is to upgrade to patched versions 25.11 or 26.05 where the issue is resolved. Until upgrades can be performed, organizations should restrict network access to the Odoo database manager interface by implementing firewall rules or network segmentation to prevent external access. Additionally, deploying reverse proxies with authentication or VPN access can help protect the interface. Monitoring HTTP access logs for requests to /web/database can help detect attempted exploitation. Organizations should also consider disabling the database manager interface in production environments or configuring Odoo to run in a mode that does not expose this interface externally. Finally, regular backups of Odoo databases should be maintained to enable recovery in case of data deletion.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-29T14:03:42.540Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69813006f9fa50a62f63a40a
Added to database: 2/2/2026, 11:15:18 PM
Last enriched: 2/2/2026, 11:29:38 PM
Last updated: 2/6/2026, 1:38:42 PM
Views: 49
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2055: Information Disclosure in D-Link DIR-605L
MediumCVE-2026-2054: Information Disclosure in D-Link DIR-605L
MediumCVE-2026-2018: SQL Injection in itsourcecode School Management System
MediumCVE-2026-2017: Stack-based Buffer Overflow in IP-COM W30AP
CriticalCVE-2026-1293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yoast Yoast SEO – Advanced SEO with real-time guidance and built-in AI
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.