Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25137: CWE-552: Files or Directories Accessible to External Parties in NixOS nixpkgs

0
Critical
VulnerabilityCVE-2026-25137cvecve-2026-25137cwe-552cwe-306
Published: Mon Feb 02 2026 (02/02/2026, 22:47:50 UTC)
Source: CVE Database V5
Vendor/Project: NixOS
Product: nixpkgs

Description

The NixOs Odoo package is an open source ERP and CRM system. From 21.11 to before 25.11 and 26.05, every NixOS based Odoo setup publicly exposes the database manager without any authentication. This allows unauthorized actors to delete and download the entire database, including Odoos file store. Unauthorized access is evident from http requests. If kept, searching access logs and/or Odoos log for requests to /web/database can give indicators, if this has been actively exploited. The database manager is a featured intended for development and not meant to be publicly reachable. On other setups, a master password acts as 2nd line of defence. However, due to the nature of NixOS, Odoo is not able to modify its own configuration file and thus unable to persist the auto-generated password. This also applies when manually setting a master password in the web-UI. This means, the password is lost when restarting Odoo. When no password is set, the user is prompted to set one directly via the database manager. This requires no authentication or action by any authorized user or the system administrator. Thus, the database is effectively world readable by anyone able to reach Odoo. This vulnerability is fixed in 25.11 and 26.05.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/10/2026, 10:48:18 UTC

Technical Analysis

CVE-2026-25137 is a critical security vulnerability affecting the Odoo package distributed via NixOS nixpkgs between versions 21.11 and before 25.11 and 26.05. Odoo is an open-source ERP and CRM system that includes a database manager interface intended solely for development environments and protected by a master password in typical deployments. However, due to NixOS's immutable configuration model, Odoo cannot persist the auto-generated master password or any manually set password after a restart. Consequently, the database manager interface is exposed without authentication to any external party able to reach the service endpoint. This exposure allows unauthorized users to perform destructive actions such as deleting the entire database or exfiltrating sensitive data, including the file store. The vulnerability arises from CWE-552 (files or directories accessible to external parties) and CWE-306 (missing authentication for critical function). Exploitation requires no privileges or user interaction and can be detected by analyzing HTTP requests targeting the /web/database path in access logs. The vulnerability has a CVSS v3.1 score of 9.1 (critical), reflecting its high impact on confidentiality and availability with low attack complexity. The issue is resolved in NixOS versions 25.11 and 26.05, where the master password persistence problem is addressed. No known exploits are currently reported in the wild, but the ease of exploitation and severity warrant urgent attention.

Potential Impact

For European organizations, this vulnerability poses a severe risk to the confidentiality and availability of critical business data managed by Odoo ERP/CRM systems deployed on NixOS. Unauthorized access to the database manager can lead to complete data exfiltration, including sensitive customer, financial, and operational records, resulting in data breaches and regulatory non-compliance under GDPR. Additionally, attackers can delete databases, causing significant operational disruption and potential financial losses. The lack of authentication means that any external attacker scanning for exposed Odoo instances can exploit this vulnerability without any prior access or user interaction. Organizations relying on NixOS for Odoo deployments, especially in sectors like manufacturing, retail, and services, could face reputational damage and legal consequences. The vulnerability also increases the attack surface for ransomware or data destruction campaigns targeting European enterprises. Given the criticality and ease of exploitation, the threat is substantial and demands immediate remediation.

Mitigation Recommendations

European organizations should immediately upgrade affected NixOS Odoo packages to versions 25.11 or 26.05 where the vulnerability is fixed. Until upgrades are applied, network-level mitigations must be enforced, such as restricting access to the Odoo database manager interface via firewall rules or VPNs to trusted internal users only. Organizations should audit their NixOS Odoo deployments to identify any publicly exposed /web/database endpoints and block external access. Monitoring and analyzing HTTP access logs for requests to /web/database can help detect exploitation attempts early. Implementing network segmentation to isolate Odoo servers and applying strict access controls will reduce exposure. Additionally, organizations should consider deploying Web Application Firewalls (WAFs) with rules to block unauthorized access to the database manager path. Regular backups of Odoo databases and file stores should be maintained to enable recovery in case of data deletion. Finally, educating system administrators about the unique configuration challenges of NixOS and Odoo password persistence can prevent misconfigurations leading to exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-29T14:03:42.540Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69813006f9fa50a62f63a40a

Added to database: 2/2/2026, 11:15:18 PM

Last enriched: 2/10/2026, 10:48:18 AM

Last updated: 3/24/2026, 12:35:54 AM

Views: 188

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses