Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12472: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Google Cloud Looker

0
High
VulnerabilityCVE-2025-12472cvecve-2025-12472cwe-362
Published: Wed Nov 19 2025 (11/19/2025, 10:27:56 UTC)
Source: CVE Database V5
Vendor/Project: Google Cloud
Product: Looker

Description

An attacker with a Looker Developer role could manipulate a LookML project to exploit a race condition during Git directory deletion, leading to arbitrary command execution on the Looker instance. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.103+ * 24.18.195+ * 25.0.72+ * 25.6.60+ * 25.8.42+ * 25.10.22+

AI-Powered Analysis

AILast updated: 11/26/2025, 12:00:03 UTC

Technical Analysis

CVE-2025-12472 is a race condition vulnerability classified under CWE-362 affecting Google Cloud Looker, a business intelligence and data analytics platform. The flaw arises from improper synchronization when deleting Git directories within LookML projects. An attacker with the Looker Developer role can manipulate project files to trigger a timing window during the deletion process, allowing arbitrary command execution on the Looker instance. This can lead to full compromise of the Looker server environment, potentially exposing sensitive data or enabling further lateral movement. Both Looker-hosted and self-hosted deployments were vulnerable; however, Google has already mitigated the issue for Looker-hosted instances. Self-hosted users must upgrade to patched versions listed by Google to remediate the vulnerability. The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), required privileges (PR:H), user interaction (UI:A), and high impact on confidentiality, integrity, and availability (C:H, I:H, A:H). No public exploits have been reported yet, but the vulnerability's nature and access requirements make it a significant risk for organizations with self-hosted Looker deployments, especially those with multiple developers having elevated permissions.

Potential Impact

For European organizations, the impact of CVE-2025-12472 can be severe, particularly for those relying on self-hosted Looker instances for critical business intelligence and analytics functions. Exploitation could lead to arbitrary command execution on the Looker server, resulting in data breaches, unauthorized data manipulation, or disruption of analytics services. This could compromise sensitive business data, violate data protection regulations such as GDPR, and damage organizational reputation. The requirement for a developer role to exploit the vulnerability limits exposure but does not eliminate risk, especially in larger organizations with multiple developers or insufficient role management. Additionally, the ability to execute arbitrary commands could facilitate further attacks within the network, increasing the potential for widespread impact. The fact that Looker-hosted instances are already mitigated reduces risk for cloud customers, but self-hosted deployments remain vulnerable until patched.

Mitigation Recommendations

European organizations using self-hosted Looker instances must prioritize upgrading to the patched versions listed by Google (24.12.103+, 24.18.195+, 25.0.72+, 25.6.60+, 25.8.42+, or 25.10.22+). Beyond patching, organizations should implement strict role-based access control (RBAC) to limit the number of users with the Looker Developer role, reducing the attack surface. Regular audits of developer activities and Git operations within Looker should be conducted to detect anomalous behavior indicative of exploitation attempts. Network segmentation and monitoring of Looker server communications can help detect and contain potential breaches. Employing application-layer firewalls or endpoint detection and response (EDR) solutions on Looker servers can provide additional layers of defense. Finally, organizations should ensure that incident response plans include scenarios involving Looker compromise to enable rapid containment and recovery.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GoogleCloud
Date Reserved
2025-10-29T15:56:30.205Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691da109a788429a71e487c5

Added to database: 11/19/2025, 10:50:49 AM

Last enriched: 11/26/2025, 12:00:03 PM

Last updated: 1/8/2026, 7:37:14 AM

Views: 104

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats