Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-25137
Awaiting Analysis
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-02 Feb, 2026 | 23:16
Updated At-03 Feb, 2026 | 16:44

The NixOs Odoo package is an open source ERP and CRM system. From 21.11 to before 25.11 and 26.05, every NixOS based Odoo setup publicly exposes the database manager without any authentication. This allows unauthorized actors to delete and download the entire database, including Odoos file store. Unauthorized access is evident from http requests. If kept, searching access logs and/or Odoos log for requests to /web/database can give indicators, if this has been actively exploited. The database manager is a featured intended for development and not meant to be publicly reachable. On other setups, a master password acts as 2nd line of defence. However, due to the nature of NixOS, Odoo is not able to modify its own configuration file and thus unable to persist the auto-generated password. This also applies when manually setting a master password in the web-UI. This means, the password is lost when restarting Odoo. When no password is set, the user is prompted to set one directly via the database manager. This requires no authentication or action by any authorized user or the system administrator. Thus, the database is effectively world readable by anyone able to reach Odoo. This vulnerability is fixed in 25.11 and 26.05.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.1CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 9.1
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-306Primarysecurity-advisories@github.com
CWE-552Primarysecurity-advisories@github.com
CWE ID: CWE-306
Type: Primary
Source: security-advisories@github.com
CWE ID: CWE-552
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/NixOS/nixpkgs/pull/485310security-advisories@github.com
N/A
https://github.com/NixOS/nixpkgs/pull/485454security-advisories@github.com
N/A
https://github.com/NixOS/nixpkgs/security/advisories/GHSA-cwmq-6wv5-f3pxsecurity-advisories@github.com
N/A
Hyperlink: https://github.com/NixOS/nixpkgs/pull/485310
Source: security-advisories@github.com
Resource: N/A
Hyperlink: https://github.com/NixOS/nixpkgs/pull/485454
Source: security-advisories@github.com
Resource: N/A
Hyperlink: https://github.com/NixOS/nixpkgs/security/advisories/GHSA-cwmq-6wv5-f3px
Source: security-advisories@github.com
Resource: N/A
Change History
0Changes found

Details not found