Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25137: CWE-552: Files or Directories Accessible to External Parties in NixOS nixpkgs

0
Critical
VulnerabilityCVE-2026-25137cvecve-2026-25137cwe-552cwe-306
Published: Mon Feb 02 2026 (02/02/2026, 22:47:50 UTC)
Source: CVE Database V5
Vendor/Project: NixOS
Product: nixpkgs

Description

The NixOs Odoo package is an open source ERP and CRM system. From 21.11 to before 25.11 and 26.05, every NixOS based Odoo setup publicly exposes the database manager without any authentication. This allows unauthorized actors to delete and download the entire database, including Odoos file store. Unauthorized access is evident from http requests. If kept, searching access logs and/or Odoos log for requests to /web/database can give indicators, if this has been actively exploited. The database manager is a featured intended for development and not meant to be publicly reachable. On other setups, a master password acts as 2nd line of defence. However, due to the nature of NixOS, Odoo is not able to modify its own configuration file and thus unable to persist the auto-generated password. This also applies when manually setting a master password in the web-UI. This means, the password is lost when restarting Odoo. When no password is set, the user is prompted to set one directly via the database manager. This requires no authentication or action by any authorized user or the system administrator. Thus, the database is effectively world readable by anyone able to reach Odoo. This vulnerability is fixed in 25.11 and 26.05.

AI-Powered Analysis

AILast updated: 02/02/2026, 23:29:38 UTC

Technical Analysis

CVE-2026-25137 is a critical security vulnerability in the NixOS nixpkgs distribution affecting the Odoo ERP/CRM package versions from 21.11 up to but not including 25.11 and 26.05. The core issue arises because the Odoo database manager interface, which is intended only for development use, is exposed publicly without any authentication mechanism. Normally, Odoo uses a master password as a second line of defense; however, due to the immutable nature of NixOS configurations, Odoo cannot persist the auto-generated master password or any manually set password across restarts. Consequently, after each restart, the database manager is left unprotected and accessible to anyone able to reach the Odoo service endpoint. This allows unauthorized actors to perform destructive actions such as deleting the entire database or downloading all stored data, including sensitive files. The vulnerability is evident from HTTP requests targeting the /web/database path, and defenders can search logs for such activity to identify potential exploitation. The flaw is classified under CWE-552 (Files or Directories Accessible to External Parties) and CWE-306 (Missing Authentication for Critical Function). The vulnerability has a CVSS v3.1 score of 9.1, reflecting its critical severity, with network attack vector, no required privileges or user interaction, and high impact on confidentiality and availability. The issue has been resolved in NixOS versions 25.11 and 26.05.

Potential Impact

For European organizations using NixOS with the affected Odoo package versions, this vulnerability poses a severe risk to business operations and data confidentiality. Unauthorized access to the database manager can lead to complete data exfiltration, including sensitive customer and business information stored within Odoo’s ERP and CRM modules. Additionally, attackers can delete the entire database, causing significant operational downtime and data loss. Given Odoo’s role in managing critical business processes, exploitation could disrupt supply chains, financial operations, and customer relationship management. The lack of authentication and ease of exploitation mean that any exposed Odoo instance on the internet is at immediate risk. This could also lead to regulatory compliance violations under GDPR due to unauthorized disclosure of personal data. The vulnerability’s impact on availability and confidentiality makes it a critical concern for European enterprises relying on NixOS-based Odoo deployments.

Mitigation Recommendations

European organizations should immediately verify if their Odoo deployments on NixOS are running affected versions (>=21.11 and <25.11). The primary mitigation is to upgrade to patched versions 25.11 or 26.05 where the issue is resolved. Until upgrades can be performed, organizations should restrict network access to the Odoo database manager interface by implementing firewall rules or network segmentation to prevent external access. Additionally, deploying reverse proxies with authentication or VPN access can help protect the interface. Monitoring HTTP access logs for requests to /web/database can help detect attempted exploitation. Organizations should also consider disabling the database manager interface in production environments or configuring Odoo to run in a mode that does not expose this interface externally. Finally, regular backups of Odoo databases should be maintained to enable recovery in case of data deletion.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-29T14:03:42.540Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69813006f9fa50a62f63a40a

Added to database: 2/2/2026, 11:15:18 PM

Last enriched: 2/2/2026, 11:29:38 PM

Last updated: 2/6/2026, 1:38:42 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats