Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12405: CWE-269: Improper Privilege Management in Google Cloud Looker Studio

0
High
VulnerabilityCVE-2025-12405cvecve-2025-12405cwe-269
Published: Mon Nov 10 2025 (11/10/2025, 09:27:45 UTC)
Source: CVE Database V5
Vendor/Project: Google Cloud
Product: Looker Studio

Description

An improper privilege management vulnerability was found in Looker Studio. It impacted all JDBC-based connectors. A Looker Studio user with report view access could make a copy of the report and execute arbitrary SQL that would run on the data source database due to the stored credentials attached to the report. This vulnerability was patched on 21 July 2025, and no customer action is needed.

AI-Powered Analysis

AILast updated: 11/10/2025, 10:00:58 UTC

Technical Analysis

CVE-2025-12405 is an improper privilege management vulnerability classified under CWE-269, discovered in Google Cloud Looker Studio, specifically impacting all JDBC-based connectors. The core issue arises because Looker Studio stores database credentials within reports, allowing users with only report view access to create copies of reports and execute arbitrary SQL commands on the connected data source. This occurs because the copied report retains the stored credentials, effectively elevating the privileges of a low-privileged user to execute potentially harmful SQL queries. The vulnerability compromises the confidentiality, integrity, and availability of the underlying databases by enabling unauthorized data retrieval, modification, or deletion. The vulnerability was publicly disclosed on November 10, 2025, with a patch released earlier on July 21, 2025. The CVSS 4.0 base score is 7.7 (high severity), reflecting network attack vector, low attack complexity, partial privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No known exploits have been observed in the wild, but the ease of exploitation and the potential impact make timely patching critical. The vulnerability affects all versions prior to the patch and is particularly concerning for organizations relying heavily on Looker Studio for business intelligence and data analytics connected via JDBC.

Potential Impact

For European organizations, this vulnerability poses a significant risk to sensitive data managed through Looker Studio, especially in sectors like finance, healthcare, government, and critical infrastructure where JDBC connectors are commonly used. Unauthorized SQL execution could lead to data breaches, unauthorized data manipulation, or disruption of services relying on the affected databases. The breach of confidentiality could expose personal data protected under GDPR, leading to regulatory penalties and reputational damage. Integrity violations could corrupt critical business data, affecting decision-making and operational continuity. Availability impacts could arise if attackers execute destructive SQL commands. Since the vulnerability requires only report view access, insider threats or compromised low-privilege accounts could be leveraged to exploit this flaw. The high adoption of Google Cloud services in Europe means many organizations could be exposed if patches are not applied promptly.

Mitigation Recommendations

Organizations should immediately verify that their Looker Studio instances are updated to the patched version released on July 21, 2025. Beyond patching, administrators should audit user permissions to ensure that report view access is granted only to trusted users and consider implementing stricter access controls or role-based access management to limit exposure. Monitoring and logging of report copying activities and SQL query executions should be enhanced to detect suspicious behavior indicative of exploitation attempts. Where possible, segregate sensitive data sources and limit JDBC connector usage to essential reports only. Employ network segmentation and database-level access controls to minimize the impact of any unauthorized SQL execution. Regularly review and rotate database credentials used by Looker Studio to reduce risk from credential leakage. Finally, conduct security awareness training to inform users about the risks associated with report sharing and copying.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GoogleCloud
Date Reserved
2025-10-28T14:51:58.029Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6911b458512c1b862c8e34fb

Added to database: 11/10/2025, 9:46:00 AM

Last enriched: 11/10/2025, 10:00:58 AM

Last updated: 11/10/2025, 6:07:02 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats