CVE-2025-12414: CWE-290 Authentication Bypass by Spoofing in Google Cloud Looker
An attacker could take over a Looker account in a Looker instance configured with OIDC authentication, due to email address string normalization.Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.100+ * 24.18.193+ * 25.0.69+ * 25.6.57+ * 25.8.39+ * 25.10.22+ * 25.12.0+
AI Analysis
Technical Summary
CVE-2025-12414 is an authentication bypass vulnerability classified under CWE-290, affecting Google Cloud Looker instances that use OpenID Connect (OIDC) for authentication. The root cause is improper normalization of email address strings during the authentication process. This flaw allows an attacker to spoof email addresses, bypassing authentication controls and gaining unauthorized access to Looker accounts. Both Looker-hosted and self-hosted deployments were initially vulnerable, but Google has already mitigated the issue in Looker-hosted environments. Self-hosted instances remain at risk unless upgraded to patched versions starting from 24.12.100 and above. The vulnerability has a CVSS 4.0 base score of 9.2, reflecting its critical nature due to network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Exploitation could enable attackers to assume identities of legitimate users, potentially accessing sensitive business intelligence data, modifying reports, or disrupting analytics workflows. Although no active exploits have been reported, the severity and ease of exploitation make timely patching imperative. The vulnerability highlights the importance of robust input validation and normalization in authentication mechanisms, especially when integrating federated identity providers like OIDC.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive business intelligence data managed within Looker. Attackers exploiting this flaw could gain unauthorized access to analytics dashboards, reports, and underlying data sources, potentially leading to data breaches, intellectual property theft, or manipulation of critical business metrics. This could disrupt decision-making processes and damage organizational reputation. The availability of Looker services could also be impacted if attackers modify or delete key analytics assets. Sectors such as finance, healthcare, manufacturing, and government agencies in Europe that rely on self-hosted Looker instances for data analytics are particularly vulnerable. Given the criticality of data handled by Looker, exploitation could also lead to regulatory non-compliance under GDPR, resulting in legal and financial penalties. The lack of required user interaction and the network-based attack vector increase the likelihood of exploitation, emphasizing the urgency for European entities to remediate promptly.
Mitigation Recommendations
European organizations using self-hosted Google Cloud Looker should immediately verify their version and upgrade to one of the patched releases: 24.12.100+, 24.18.193+, 25.0.69+, 25.6.57+, 25.8.39+, 25.10.22+, or 25.12.0+. Beyond patching, organizations must audit their OIDC authentication configurations to ensure strict email normalization and validation policies are enforced. Implementing multi-factor authentication (MFA) can provide an additional security layer to mitigate account takeover risks. Monitoring authentication logs for unusual login patterns or multiple failed attempts can help detect exploitation attempts early. Network segmentation and limiting Looker instance access to trusted IP ranges can reduce exposure. Regular security assessments and penetration testing focused on identity and access management controls are recommended. Finally, organizations should prepare incident response plans specific to Looker account compromises to minimize damage in case of exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Switzerland, Italy, Spain
CVE-2025-12414: CWE-290 Authentication Bypass by Spoofing in Google Cloud Looker
Description
An attacker could take over a Looker account in a Looker instance configured with OIDC authentication, due to email address string normalization.Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.100+ * 24.18.193+ * 25.0.69+ * 25.6.57+ * 25.8.39+ * 25.10.22+ * 25.12.0+
AI-Powered Analysis
Technical Analysis
CVE-2025-12414 is an authentication bypass vulnerability classified under CWE-290, affecting Google Cloud Looker instances that use OpenID Connect (OIDC) for authentication. The root cause is improper normalization of email address strings during the authentication process. This flaw allows an attacker to spoof email addresses, bypassing authentication controls and gaining unauthorized access to Looker accounts. Both Looker-hosted and self-hosted deployments were initially vulnerable, but Google has already mitigated the issue in Looker-hosted environments. Self-hosted instances remain at risk unless upgraded to patched versions starting from 24.12.100 and above. The vulnerability has a CVSS 4.0 base score of 9.2, reflecting its critical nature due to network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Exploitation could enable attackers to assume identities of legitimate users, potentially accessing sensitive business intelligence data, modifying reports, or disrupting analytics workflows. Although no active exploits have been reported, the severity and ease of exploitation make timely patching imperative. The vulnerability highlights the importance of robust input validation and normalization in authentication mechanisms, especially when integrating federated identity providers like OIDC.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive business intelligence data managed within Looker. Attackers exploiting this flaw could gain unauthorized access to analytics dashboards, reports, and underlying data sources, potentially leading to data breaches, intellectual property theft, or manipulation of critical business metrics. This could disrupt decision-making processes and damage organizational reputation. The availability of Looker services could also be impacted if attackers modify or delete key analytics assets. Sectors such as finance, healthcare, manufacturing, and government agencies in Europe that rely on self-hosted Looker instances for data analytics are particularly vulnerable. Given the criticality of data handled by Looker, exploitation could also lead to regulatory non-compliance under GDPR, resulting in legal and financial penalties. The lack of required user interaction and the network-based attack vector increase the likelihood of exploitation, emphasizing the urgency for European entities to remediate promptly.
Mitigation Recommendations
European organizations using self-hosted Google Cloud Looker should immediately verify their version and upgrade to one of the patched releases: 24.12.100+, 24.18.193+, 25.0.69+, 25.6.57+, 25.8.39+, 25.10.22+, or 25.12.0+. Beyond patching, organizations must audit their OIDC authentication configurations to ensure strict email normalization and validation policies are enforced. Implementing multi-factor authentication (MFA) can provide an additional security layer to mitigate account takeover risks. Monitoring authentication logs for unusual login patterns or multiple failed attempts can help detect exploitation attempts early. Network segmentation and limiting Looker instance access to trusted IP ranges can reduce exposure. Regular security assessments and penetration testing focused on identity and access management controls are recommended. Finally, organizations should prepare incident response plans specific to Looker account compromises to minimize damage in case of exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GoogleCloud
- Date Reserved
- 2025-10-28T15:40:31.760Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691ef03b961e3d19a6aa6309
Added to database: 11/20/2025, 10:40:59 AM
Last enriched: 11/20/2025, 10:55:55 AM
Last updated: 11/20/2025, 3:31:51 PM
Views: 71
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.