Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12155: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Google Cloud Looker

0
High
VulnerabilityCVE-2025-12155cvecve-2025-12155cwe-77
Published: Mon Nov 10 2025 (11/10/2025, 08:49:45 UTC)
Source: CVE Database V5
Vendor/Project: Google Cloud
Product: Looker

Description

A Command Injection vulnerability, resulting from improper file path sanitization (Directory Traversal) in Looker allows an attacker with Developer permission to execute arbitrary shell commands when a user is deleted on the host system. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.100+ * 24.18.192+ * 25.0.69+ * 25.6.57+ * 25.8.39+ * 25.10.22+

AI-Powered Analysis

AILast updated: 11/17/2025, 10:04:38 UTC

Technical Analysis

CVE-2025-12155 is a command injection vulnerability classified under CWE-77, discovered in Google Cloud Looker, a business intelligence and data analytics platform. The flaw stems from improper neutralization of special elements in file paths, specifically a directory traversal issue that occurs when a user is deleted on the host system. An attacker possessing Developer-level permissions can exploit this vulnerability to execute arbitrary shell commands on the underlying host, potentially leading to full system compromise. The vulnerability affects both Looker-hosted and self-hosted instances; however, Google has already mitigated the risk in Looker-hosted environments, requiring no user intervention. Self-hosted instances remain vulnerable unless upgraded to patched versions 24.12.100+, 24.18.192+, 25.0.69+, 25.6.57+, 25.8.39+, or 25.10.22+. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), partial authentication required (AT:P), high privileges required (PR:H), and user interaction needed (UI:A). The vulnerability impacts confidentiality, integrity, and availability at a high level, with scope limited to the vulnerable instance. No public exploits have been reported yet, but the potential for severe damage exists if exploited. The vulnerability was reserved on 2025-10-24 and published on 2025-11-10.

Potential Impact

For European organizations, the impact of CVE-2025-12155 can be severe, especially for those relying on self-hosted Looker deployments for critical business intelligence and data analytics. Successful exploitation could allow attackers to execute arbitrary commands on the host system, leading to data theft, unauthorized data manipulation, service disruption, or lateral movement within the network. Confidential business data and analytics could be exposed or corrupted, undermining decision-making processes. The requirement for Developer permissions limits the attack surface but does not eliminate risk, as insider threats or compromised developer accounts could be leveraged. Given Looker's role in aggregating and analyzing sensitive data, the vulnerability poses a significant risk to data confidentiality and system integrity. Disruption of Looker services could also affect operational continuity. The lack of known exploits currently reduces immediate risk but does not preclude future attacks, emphasizing the need for prompt remediation.

Mitigation Recommendations

European organizations using self-hosted Looker instances should immediately upgrade to one of the patched versions: 24.12.100+, 24.18.192+, 25.0.69+, 25.6.57+, 25.8.39+, or 25.10.22+. Prior to upgrading, conduct a thorough audit of Developer permissions to ensure only trusted personnel have such access, minimizing the risk of insider exploitation. Implement strict access controls and monitor developer activities for suspicious behavior. Employ host-based intrusion detection systems (HIDS) to detect anomalous command executions. Regularly review and sanitize user management workflows to prevent injection opportunities. Network segmentation can limit the impact of a compromised Looker host. Additionally, maintain up-to-date backups of Looker configurations and data to enable rapid recovery if compromise occurs. Finally, stay informed about any emerging exploit reports or additional patches from Google Cloud.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GoogleCloud
Date Reserved
2025-10-24T13:07:55.182Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6911aa71983053a663d2120d

Added to database: 11/10/2025, 9:03:45 AM

Last enriched: 11/17/2025, 10:04:38 AM

Last updated: 12/23/2025, 7:49:41 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats