CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Lifecycle Timeline
2DescriptionNVD
The NixOs Odoo package is an open source ERP and CRM system. From 21.11 to before 25.11 and 26.05, every NixOS based Odoo setup publicly exposes the database manager without any authentication. This allows unauthorized actors to delete and download the entire database, including Odoos file store. Unauthorized access is evident from http requests. If kept, searching access logs and/or Odoos log for requests to /web/database can give indicators, if this has been actively exploited. The database manager is a featured intended for development and not meant to be publicly reachable. On other setups, a master password acts as 2nd line of defence. However, due to the nature of NixOS, Odoo is not able to modify its own configuration file and thus unable to persist the auto-generated password. This also applies when manually setting a master password in the web-UI. This means, the password is lost when restarting Odoo. When no password is set, the user is prompted to set one directly via the database manager. This requires no authentication or action by any authorized user or the system administrator. Thus, the database is effectively world readable by anyone able to reach Odoo. This vulnerability is fixed in 25.11 and 26.05.
AnalysisAI
NixOS Odoo package from 21.11 to before 25.11 publicly exposes the database manager interface without authentication, enabling full database control.
Sign in for full analysis, threat intelligence, and remediation guidance.
RemediationAI
Within 24 hours: Audit network access logs for unauthorized database manager access; take affected Odoo instances offline or restrict network access to trusted IPs only; notify affected stakeholders and legal/compliance teams. Within 7 days: Implement WAF rules blocking unauthenticated database manager endpoints; deploy network segmentation to isolate Odoo systems; conduct forensic analysis of access logs to determine if unauthorized access occurred. …
Sign in for detailed remediation steps.
Share
External POC / Exploit Code
Leaving vuln.today