CVE-2025-12472: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Google Cloud Looker
An attacker with a Looker Developer role could manipulate a LookML project to exploit a race condition during Git directory deletion, leading to arbitrary command execution on the Looker instance. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.103+ * 24.18.195+ * 25.0.72+ * 25.6.60+ * 25.8.42+ * 25.10.22+
AI Analysis
Technical Summary
CVE-2025-12472 is a race condition vulnerability classified under CWE-362, found in Google Cloud Looker, a business intelligence and data analytics platform. The flaw arises from improper synchronization during the deletion of Git directories within LookML projects. Specifically, an attacker with the Looker Developer role can manipulate project files to trigger a timing window where concurrent operations on shared resources are unsafely handled. This race condition allows the attacker to execute arbitrary commands on the Looker instance, potentially leading to full system compromise. Both Looker-hosted and self-hosted instances were initially vulnerable; however, Google has already mitigated the issue in Looker-hosted environments. Self-hosted users must upgrade to patched versions (24.12.103+, 24.18.195+, 25.0.72+, 25.6.60+, 25.8.42+, or 25.10.22+) available from the official Looker download page. The vulnerability has a CVSS 4.0 score of 7.1, indicating high severity with network attack vector, high complexity, and requiring privileges and user interaction. Exploitation could allow attackers to bypass normal access controls and execute arbitrary commands, threatening the confidentiality, integrity, and availability of the affected systems. No public exploits have been reported yet, but the risk remains significant for unpatched self-hosted deployments.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those using self-hosted Looker instances to manage sensitive business intelligence data. Successful exploitation could allow attackers to execute arbitrary commands on the Looker server, potentially leading to data theft, unauthorized data manipulation, or disruption of analytics services. This could impact decision-making processes, expose confidential business data, and cause operational downtime. Given Looker's role in data analytics, compromised instances could also serve as pivot points for further network intrusion. The requirement for a Looker Developer role to exploit the vulnerability somewhat limits the attack surface but insider threats or compromised developer accounts increase risk. Organizations in sectors such as finance, manufacturing, retail, and government, which rely heavily on data analytics, could face severe reputational and regulatory consequences if exploited.
Mitigation Recommendations
European organizations operating self-hosted Looker instances must urgently upgrade to the patched versions listed by Google (24.12.103+, 24.18.195+, 25.0.72+, 25.6.60+, 25.8.42+, or 25.10.22+). Additionally, organizations should enforce strict access controls and monitoring on Looker Developer roles to reduce the risk of insider threats or compromised credentials. Implementing multi-factor authentication (MFA) for developer accounts and auditing LookML project changes can help detect suspicious activity. Network segmentation should be applied to isolate Looker servers from critical infrastructure. Regularly reviewing and restricting permissions to the minimum necessary for developers will limit potential exploitation. Finally, organizations should maintain up-to-date backups of Looker configurations and data to enable recovery in case of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-12472: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Google Cloud Looker
Description
An attacker with a Looker Developer role could manipulate a LookML project to exploit a race condition during Git directory deletion, leading to arbitrary command execution on the Looker instance. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.103+ * 24.18.195+ * 25.0.72+ * 25.6.60+ * 25.8.42+ * 25.10.22+
AI-Powered Analysis
Technical Analysis
CVE-2025-12472 is a race condition vulnerability classified under CWE-362, found in Google Cloud Looker, a business intelligence and data analytics platform. The flaw arises from improper synchronization during the deletion of Git directories within LookML projects. Specifically, an attacker with the Looker Developer role can manipulate project files to trigger a timing window where concurrent operations on shared resources are unsafely handled. This race condition allows the attacker to execute arbitrary commands on the Looker instance, potentially leading to full system compromise. Both Looker-hosted and self-hosted instances were initially vulnerable; however, Google has already mitigated the issue in Looker-hosted environments. Self-hosted users must upgrade to patched versions (24.12.103+, 24.18.195+, 25.0.72+, 25.6.60+, 25.8.42+, or 25.10.22+) available from the official Looker download page. The vulnerability has a CVSS 4.0 score of 7.1, indicating high severity with network attack vector, high complexity, and requiring privileges and user interaction. Exploitation could allow attackers to bypass normal access controls and execute arbitrary commands, threatening the confidentiality, integrity, and availability of the affected systems. No public exploits have been reported yet, but the risk remains significant for unpatched self-hosted deployments.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those using self-hosted Looker instances to manage sensitive business intelligence data. Successful exploitation could allow attackers to execute arbitrary commands on the Looker server, potentially leading to data theft, unauthorized data manipulation, or disruption of analytics services. This could impact decision-making processes, expose confidential business data, and cause operational downtime. Given Looker's role in data analytics, compromised instances could also serve as pivot points for further network intrusion. The requirement for a Looker Developer role to exploit the vulnerability somewhat limits the attack surface but insider threats or compromised developer accounts increase risk. Organizations in sectors such as finance, manufacturing, retail, and government, which rely heavily on data analytics, could face severe reputational and regulatory consequences if exploited.
Mitigation Recommendations
European organizations operating self-hosted Looker instances must urgently upgrade to the patched versions listed by Google (24.12.103+, 24.18.195+, 25.0.72+, 25.6.60+, 25.8.42+, or 25.10.22+). Additionally, organizations should enforce strict access controls and monitoring on Looker Developer roles to reduce the risk of insider threats or compromised credentials. Implementing multi-factor authentication (MFA) for developer accounts and auditing LookML project changes can help detect suspicious activity. Network segmentation should be applied to isolate Looker servers from critical infrastructure. Regularly reviewing and restricting permissions to the minimum necessary for developers will limit potential exploitation. Finally, organizations should maintain up-to-date backups of Looker configurations and data to enable recovery in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GoogleCloud
- Date Reserved
- 2025-10-29T15:56:30.205Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691da109a788429a71e487c5
Added to database: 11/19/2025, 10:50:49 AM
Last enriched: 11/19/2025, 11:05:45 AM
Last updated: 11/19/2025, 1:00:12 PM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12592: CWE-1392 CWE-1392: Use of Default Credentials in Vivotek Affected device model numbers are FD7131-VVTK,FD7131-VVTK,FD7131-VVTK,FD7141-VVTK,IP7131-VVTK,IP7133-VVTK,IP7133-VVTK,IP7133-VVTK,IP7134-VVTK,IP7135-VVTK,IP7135-VVTK,IP7135-VVTK,IP7135-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7138-VVTK,IP7142-VVTK,IP7142-VVTK,IP7151-VVTK,IP7152-VVTK,IP7153-VVTK,IP7153-VVTK,IP7154-VVTK,IP7330-VVTK,IP7330-VVTK,IP7330-VVTK,IP8131-VVTK,IP8131-VVTK,IP8131-VVTK,IP8131W-VVTK,PT7135-VVTK,PT7137-TCON,PT7137-VVTK,PT7137-VVTK,PT7137-VVTK,PT7137-VVTK,PZ7131-VVTK,PZ7131-VVTK,PZ71X1-VVTK,PZ71X1-VVTK,PZ71X2-VVTK,SD73X3-VVTK,SD73X3-VVTK,SD73X3-VVTK,TC5330-VVTK,TC5332-TCVV,TC5333-TCVV,TC5633-TCVV,TC5633-VVTK,VS7100-VVTK,VS7100-VVTK,VS7100-VVTK
CriticalCVE-2025-10437: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Eksagate Electronic Engineering and Computer Industry Trade Inc. Webpack Management System
CriticalCVE-2025-13395: SQL Injection in codehub666 94list
MediumCVE-2025-64408: CWE-502 Deserialization of Untrusted Data in Apache Software Foundation Apache Causeway
UnknownCVE-2025-0351
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.