Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12155: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Google Cloud Looker

0
High
VulnerabilityCVE-2025-12155cvecve-2025-12155cwe-77
Published: Mon Nov 10 2025 (11/10/2025, 08:49:45 UTC)
Source: CVE Database V5
Vendor/Project: Google Cloud
Product: Looker

Description

A Command Injection vulnerability, resulting from improper file path sanitization (Directory Traversal) in Looker allows an attacker with Developer permission to execute arbitrary shell commands when a user is deleted on the host system. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.100+ * 24.18.192+ * 25.0.69+ * 25.6.57+ * 25.8.39+ * 25.10.22+

AI-Powered Analysis

AILast updated: 11/10/2025, 09:16:28 UTC

Technical Analysis

CVE-2025-12155 is a command injection vulnerability classified under CWE-77, discovered in Google Cloud Looker, a data analytics and business intelligence platform. The flaw stems from improper neutralization of special elements in file paths, specifically a directory traversal issue triggered during the deletion of a user on the host system. An attacker possessing Developer-level permissions within Looker can exploit this vulnerability to execute arbitrary shell commands on the underlying host operating system. This can lead to unauthorized system control, data exfiltration, or further lateral movement within the network. The vulnerability affects both Looker-hosted and self-hosted deployments; however, Google has already mitigated the issue for Looker-hosted instances, requiring no user action. Self-hosted instances remain vulnerable unless upgraded to patched versions starting from 24.12.100 and above, including subsequent releases up to 25.10.22. The CVSS 4.0 vector indicates network attack vector, low attack complexity, partial user interaction, and required privileges at the high level, with high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the nature of the vulnerability and required permissions suggest that insider threats or compromised developer accounts could leverage this flaw effectively. The vulnerability was reserved on October 24, 2025, and published on November 10, 2025, reflecting a recent disclosure.

Potential Impact

For European organizations, this vulnerability poses a significant risk, particularly for those using self-hosted Looker instances for critical business intelligence and data analytics operations. Exploitation could lead to full system compromise, unauthorized access to sensitive data, disruption of analytics services, and potential lateral movement within corporate networks. The impact on confidentiality, integrity, and availability is high, potentially affecting compliance with GDPR and other data protection regulations. Organizations in finance, healthcare, manufacturing, and government sectors that rely heavily on Looker for data-driven decision-making are especially vulnerable. Additionally, the requirement for Developer permissions means that insider threats or compromised developer accounts could be leveraged to exploit this vulnerability, increasing the risk profile. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score underscores the urgency of patching to prevent future attacks.

Mitigation Recommendations

European organizations running self-hosted Looker instances must prioritize upgrading to the patched versions listed (24.12.100+, 24.18.192+, 25.0.69+, 25.6.57+, 25.8.39+, 25.10.22+). Beyond patching, organizations should audit and restrict Developer permissions to only trusted personnel, implement strict access controls and monitoring for suspicious activities related to user deletions, and enforce multi-factor authentication for all privileged accounts. Network segmentation should isolate Looker servers from critical infrastructure to limit lateral movement in case of compromise. Regularly review logs for anomalous command executions or unusual user deletion events. Employ host-based intrusion detection systems (HIDS) to detect unauthorized shell command executions. Finally, conduct security awareness training for developers and administrators about the risks of privilege misuse and the importance of timely patching.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GoogleCloud
Date Reserved
2025-10-24T13:07:55.182Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6911aa71983053a663d2120d

Added to database: 11/10/2025, 9:03:45 AM

Last enriched: 11/10/2025, 9:16:28 AM

Last updated: 11/10/2025, 5:17:54 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats