CVE-2025-12155: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Google Cloud Looker
A Command Injection vulnerability, resulting from improper file path sanitization (Directory Traversal) in Looker allows an attacker with Developer permission to execute arbitrary shell commands when a user is deleted on the host system. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.100+ * 24.18.192+ * 25.0.69+ * 25.6.57+ * 25.8.39+ * 25.10.22+
AI Analysis
Technical Summary
CVE-2025-12155 is a command injection vulnerability classified under CWE-77, discovered in Google Cloud Looker, a data analytics and business intelligence platform. The flaw stems from improper neutralization of special elements in file paths, specifically a directory traversal issue triggered during the deletion of a user on the host system. An attacker possessing Developer-level permissions within Looker can exploit this vulnerability to execute arbitrary shell commands on the underlying host operating system. This can lead to unauthorized system control, data exfiltration, or further lateral movement within the network. The vulnerability affects both Looker-hosted and self-hosted deployments; however, Google has already mitigated the issue for Looker-hosted instances, requiring no user action. Self-hosted instances remain vulnerable unless upgraded to patched versions starting from 24.12.100 and above, including subsequent releases up to 25.10.22. The CVSS 4.0 vector indicates network attack vector, low attack complexity, partial user interaction, and required privileges at the high level, with high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the nature of the vulnerability and required permissions suggest that insider threats or compromised developer accounts could leverage this flaw effectively. The vulnerability was reserved on October 24, 2025, and published on November 10, 2025, reflecting a recent disclosure.
Potential Impact
For European organizations, this vulnerability poses a significant risk, particularly for those using self-hosted Looker instances for critical business intelligence and data analytics operations. Exploitation could lead to full system compromise, unauthorized access to sensitive data, disruption of analytics services, and potential lateral movement within corporate networks. The impact on confidentiality, integrity, and availability is high, potentially affecting compliance with GDPR and other data protection regulations. Organizations in finance, healthcare, manufacturing, and government sectors that rely heavily on Looker for data-driven decision-making are especially vulnerable. Additionally, the requirement for Developer permissions means that insider threats or compromised developer accounts could be leveraged to exploit this vulnerability, increasing the risk profile. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score underscores the urgency of patching to prevent future attacks.
Mitigation Recommendations
European organizations running self-hosted Looker instances must prioritize upgrading to the patched versions listed (24.12.100+, 24.18.192+, 25.0.69+, 25.6.57+, 25.8.39+, 25.10.22+). Beyond patching, organizations should audit and restrict Developer permissions to only trusted personnel, implement strict access controls and monitoring for suspicious activities related to user deletions, and enforce multi-factor authentication for all privileged accounts. Network segmentation should isolate Looker servers from critical infrastructure to limit lateral movement in case of compromise. Regularly review logs for anomalous command executions or unusual user deletion events. Employ host-based intrusion detection systems (HIDS) to detect unauthorized shell command executions. Finally, conduct security awareness training for developers and administrators about the risks of privilege misuse and the importance of timely patching.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Ireland, Italy, Spain, Poland
CVE-2025-12155: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Google Cloud Looker
Description
A Command Injection vulnerability, resulting from improper file path sanitization (Directory Traversal) in Looker allows an attacker with Developer permission to execute arbitrary shell commands when a user is deleted on the host system. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.100+ * 24.18.192+ * 25.0.69+ * 25.6.57+ * 25.8.39+ * 25.10.22+
AI-Powered Analysis
Technical Analysis
CVE-2025-12155 is a command injection vulnerability classified under CWE-77, discovered in Google Cloud Looker, a data analytics and business intelligence platform. The flaw stems from improper neutralization of special elements in file paths, specifically a directory traversal issue triggered during the deletion of a user on the host system. An attacker possessing Developer-level permissions within Looker can exploit this vulnerability to execute arbitrary shell commands on the underlying host operating system. This can lead to unauthorized system control, data exfiltration, or further lateral movement within the network. The vulnerability affects both Looker-hosted and self-hosted deployments; however, Google has already mitigated the issue for Looker-hosted instances, requiring no user action. Self-hosted instances remain vulnerable unless upgraded to patched versions starting from 24.12.100 and above, including subsequent releases up to 25.10.22. The CVSS 4.0 vector indicates network attack vector, low attack complexity, partial user interaction, and required privileges at the high level, with high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the nature of the vulnerability and required permissions suggest that insider threats or compromised developer accounts could leverage this flaw effectively. The vulnerability was reserved on October 24, 2025, and published on November 10, 2025, reflecting a recent disclosure.
Potential Impact
For European organizations, this vulnerability poses a significant risk, particularly for those using self-hosted Looker instances for critical business intelligence and data analytics operations. Exploitation could lead to full system compromise, unauthorized access to sensitive data, disruption of analytics services, and potential lateral movement within corporate networks. The impact on confidentiality, integrity, and availability is high, potentially affecting compliance with GDPR and other data protection regulations. Organizations in finance, healthcare, manufacturing, and government sectors that rely heavily on Looker for data-driven decision-making are especially vulnerable. Additionally, the requirement for Developer permissions means that insider threats or compromised developer accounts could be leveraged to exploit this vulnerability, increasing the risk profile. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score underscores the urgency of patching to prevent future attacks.
Mitigation Recommendations
European organizations running self-hosted Looker instances must prioritize upgrading to the patched versions listed (24.12.100+, 24.18.192+, 25.0.69+, 25.6.57+, 25.8.39+, 25.10.22+). Beyond patching, organizations should audit and restrict Developer permissions to only trusted personnel, implement strict access controls and monitoring for suspicious activities related to user deletions, and enforce multi-factor authentication for all privileged accounts. Network segmentation should isolate Looker servers from critical infrastructure to limit lateral movement in case of compromise. Regularly review logs for anomalous command executions or unusual user deletion events. Employ host-based intrusion detection systems (HIDS) to detect unauthorized shell command executions. Finally, conduct security awareness training for developers and administrators about the risks of privilege misuse and the importance of timely patching.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GoogleCloud
- Date Reserved
- 2025-10-24T13:07:55.182Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6911aa71983053a663d2120d
Added to database: 11/10/2025, 9:03:45 AM
Last enriched: 11/10/2025, 9:16:28 AM
Last updated: 11/10/2025, 5:17:54 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-63497: n/a
UnknownCVE-2025-63834: n/a
HighCVE-2025-63456: n/a
MediumCVE-2025-63455: n/a
HighCVE-2025-46430: CWE-250: Execution with Unnecessary Privileges in Dell Display and Peripheral Manager
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.