CVE-2026-25137: CWE-552: Files or Directories Accessible to External Parties in NixOS nixpkgs
The NixOs Odoo package is an open source ERP and CRM system. From 21.11 to before 25.11 and 26.05, every NixOS based Odoo setup publicly exposes the database manager without any authentication. This allows unauthorized actors to delete and download the entire database, including Odoos file store. Unauthorized access is evident from http requests. If kept, searching access logs and/or Odoos log for requests to /web/database can give indicators, if this has been actively exploited. The database manager is a featured intended for development and not meant to be publicly reachable. On other setups, a master password acts as 2nd line of defence. However, due to the nature of NixOS, Odoo is not able to modify its own configuration file and thus unable to persist the auto-generated password. This also applies when manually setting a master password in the web-UI. This means, the password is lost when restarting Odoo. When no password is set, the user is prompted to set one directly via the database manager. This requires no authentication or action by any authorized user or the system administrator. Thus, the database is effectively world readable by anyone able to reach Odoo. This vulnerability is fixed in 25.11 and 26.05.
AI Analysis
Technical Summary
CVE-2026-25137 is a critical security vulnerability affecting the Odoo package distributed via NixOS nixpkgs between versions 21.11 and before 25.11 and 26.05. Odoo is an open-source ERP and CRM system that includes a database manager interface intended solely for development environments and protected by a master password in typical deployments. However, due to NixOS's immutable configuration model, Odoo cannot persist the auto-generated master password or any manually set password after a restart. Consequently, the database manager interface is exposed without authentication to any external party able to reach the service endpoint. This exposure allows unauthorized users to perform destructive actions such as deleting the entire database or exfiltrating sensitive data, including the file store. The vulnerability arises from CWE-552 (files or directories accessible to external parties) and CWE-306 (missing authentication for critical function). Exploitation requires no privileges or user interaction and can be detected by analyzing HTTP requests targeting the /web/database path in access logs. The vulnerability has a CVSS v3.1 score of 9.1 (critical), reflecting its high impact on confidentiality and availability with low attack complexity. The issue is resolved in NixOS versions 25.11 and 26.05, where the master password persistence problem is addressed. No known exploits are currently reported in the wild, but the ease of exploitation and severity warrant urgent attention.
Potential Impact
For European organizations, this vulnerability poses a severe risk to the confidentiality and availability of critical business data managed by Odoo ERP/CRM systems deployed on NixOS. Unauthorized access to the database manager can lead to complete data exfiltration, including sensitive customer, financial, and operational records, resulting in data breaches and regulatory non-compliance under GDPR. Additionally, attackers can delete databases, causing significant operational disruption and potential financial losses. The lack of authentication means that any external attacker scanning for exposed Odoo instances can exploit this vulnerability without any prior access or user interaction. Organizations relying on NixOS for Odoo deployments, especially in sectors like manufacturing, retail, and services, could face reputational damage and legal consequences. The vulnerability also increases the attack surface for ransomware or data destruction campaigns targeting European enterprises. Given the criticality and ease of exploitation, the threat is substantial and demands immediate remediation.
Mitigation Recommendations
European organizations should immediately upgrade affected NixOS Odoo packages to versions 25.11 or 26.05 where the vulnerability is fixed. Until upgrades are applied, network-level mitigations must be enforced, such as restricting access to the Odoo database manager interface via firewall rules or VPNs to trusted internal users only. Organizations should audit their NixOS Odoo deployments to identify any publicly exposed /web/database endpoints and block external access. Monitoring and analyzing HTTP access logs for requests to /web/database can help detect exploitation attempts early. Implementing network segmentation to isolate Odoo servers and applying strict access controls will reduce exposure. Additionally, organizations should consider deploying Web Application Firewalls (WAFs) with rules to block unauthorized access to the database manager path. Regular backups of Odoo databases and file stores should be maintained to enable recovery in case of data deletion. Finally, educating system administrators about the unique configuration challenges of NixOS and Odoo password persistence can prevent misconfigurations leading to exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2026-25137: CWE-552: Files or Directories Accessible to External Parties in NixOS nixpkgs
Description
The NixOs Odoo package is an open source ERP and CRM system. From 21.11 to before 25.11 and 26.05, every NixOS based Odoo setup publicly exposes the database manager without any authentication. This allows unauthorized actors to delete and download the entire database, including Odoos file store. Unauthorized access is evident from http requests. If kept, searching access logs and/or Odoos log for requests to /web/database can give indicators, if this has been actively exploited. The database manager is a featured intended for development and not meant to be publicly reachable. On other setups, a master password acts as 2nd line of defence. However, due to the nature of NixOS, Odoo is not able to modify its own configuration file and thus unable to persist the auto-generated password. This also applies when manually setting a master password in the web-UI. This means, the password is lost when restarting Odoo. When no password is set, the user is prompted to set one directly via the database manager. This requires no authentication or action by any authorized user or the system administrator. Thus, the database is effectively world readable by anyone able to reach Odoo. This vulnerability is fixed in 25.11 and 26.05.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-25137 is a critical security vulnerability affecting the Odoo package distributed via NixOS nixpkgs between versions 21.11 and before 25.11 and 26.05. Odoo is an open-source ERP and CRM system that includes a database manager interface intended solely for development environments and protected by a master password in typical deployments. However, due to NixOS's immutable configuration model, Odoo cannot persist the auto-generated master password or any manually set password after a restart. Consequently, the database manager interface is exposed without authentication to any external party able to reach the service endpoint. This exposure allows unauthorized users to perform destructive actions such as deleting the entire database or exfiltrating sensitive data, including the file store. The vulnerability arises from CWE-552 (files or directories accessible to external parties) and CWE-306 (missing authentication for critical function). Exploitation requires no privileges or user interaction and can be detected by analyzing HTTP requests targeting the /web/database path in access logs. The vulnerability has a CVSS v3.1 score of 9.1 (critical), reflecting its high impact on confidentiality and availability with low attack complexity. The issue is resolved in NixOS versions 25.11 and 26.05, where the master password persistence problem is addressed. No known exploits are currently reported in the wild, but the ease of exploitation and severity warrant urgent attention.
Potential Impact
For European organizations, this vulnerability poses a severe risk to the confidentiality and availability of critical business data managed by Odoo ERP/CRM systems deployed on NixOS. Unauthorized access to the database manager can lead to complete data exfiltration, including sensitive customer, financial, and operational records, resulting in data breaches and regulatory non-compliance under GDPR. Additionally, attackers can delete databases, causing significant operational disruption and potential financial losses. The lack of authentication means that any external attacker scanning for exposed Odoo instances can exploit this vulnerability without any prior access or user interaction. Organizations relying on NixOS for Odoo deployments, especially in sectors like manufacturing, retail, and services, could face reputational damage and legal consequences. The vulnerability also increases the attack surface for ransomware or data destruction campaigns targeting European enterprises. Given the criticality and ease of exploitation, the threat is substantial and demands immediate remediation.
Mitigation Recommendations
European organizations should immediately upgrade affected NixOS Odoo packages to versions 25.11 or 26.05 where the vulnerability is fixed. Until upgrades are applied, network-level mitigations must be enforced, such as restricting access to the Odoo database manager interface via firewall rules or VPNs to trusted internal users only. Organizations should audit their NixOS Odoo deployments to identify any publicly exposed /web/database endpoints and block external access. Monitoring and analyzing HTTP access logs for requests to /web/database can help detect exploitation attempts early. Implementing network segmentation to isolate Odoo servers and applying strict access controls will reduce exposure. Additionally, organizations should consider deploying Web Application Firewalls (WAFs) with rules to block unauthorized access to the database manager path. Regular backups of Odoo databases and file stores should be maintained to enable recovery in case of data deletion. Finally, educating system administrators about the unique configuration challenges of NixOS and Odoo password persistence can prevent misconfigurations leading to exposure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-29T14:03:42.540Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69813006f9fa50a62f63a40a
Added to database: 2/2/2026, 11:15:18 PM
Last enriched: 2/10/2026, 10:48:18 AM
Last updated: 3/24/2026, 12:35:54 AM
Views: 188
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.