Impact
The vulnerability allows any party that can reach the Odoo web interface to invoke the database manager without authentication, enabling download or deletion of the entire database and attached file store. The flaw stems from missing authentication (CWE‑306) and the inadvertent public exposure of sensitive data (CWE‑552). Consequently an attacker can erase critical business information or exfiltrate confidential records, affecting both integrity and confidentiality of the system.
Affected Systems
NixOS deployments that use the Odoo package from version 21.11 up through the releases preceding 25.11 and the 26.05 snapshot are impacted. These configurations expose the database manager on the default listening port and cannot persist a master password, leaving the database effectively world‑readable until the service is restarted.
Risk and Exploitability
The vulnerability carries a CVSS score of 9.1 and an EPSS score of less than 1 %, indicating a severe risk but a currently low probability of exploitation. It is not listed in the CISA KEV catalog. Attackers would simply issue an unauthenticated HTTP request to /web/database, a path that can be detected in web or Odoo logs. Because the system does not enforce authentication or a persistent password, any host with network access to the Odoo instance is a potential target. Organizations should treat this as a high‑risk flaw that warrants swift remediation.
OpenCVE Enrichment