CVE-2025-12739: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Google Cloud Looker
An attacker with viewer permissions in Looker could craft a malicious URL that, when opened by a Looker admin, would execute an attacker-supplied script. Exploitation required at least one Looker extension installed on the instance. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.18.201+ * 25.0.79+ * 25.6.66+ * 25.12.7+ * 25.16.0+ * 25.18.0+ * 25.20.0+
AI Analysis
Technical Summary
CVE-2025-12739 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting Google Cloud Looker, a business intelligence and data analytics platform. The flaw arises from improper neutralization of input during web page generation, allowing an attacker with viewer-level permissions to craft a malicious URL. When this URL is opened by a Looker administrator, it executes attacker-supplied scripts within the admin's browser context. This can lead to session hijacking, credential theft, or unauthorized actions performed with admin privileges. Exploitation requires that at least one Looker extension is installed on the instance, which increases the attack surface by enabling injection points. Both Looker-hosted and self-hosted deployments were vulnerable; however, Google has already mitigated the issue in Looker-hosted environments, requiring no user action. Self-hosted instances remain at risk unless upgraded to patched versions starting from 24.18.201 and above. The vulnerability has a CVSS 4.0 base score of 7.3, indicating high severity due to network attack vector, low attack complexity, partial privileges required, and user interaction needed. The impact on confidentiality, integrity, and availability is high because an attacker can execute arbitrary scripts in an admin context, potentially compromising sensitive data and administrative controls. No known exploits have been reported in the wild, but the presence of extensions and viewer permissions makes targeted attacks feasible. Organizations should verify their Looker deployment type and version, assess installed extensions, and apply updates promptly to mitigate risk.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to those using self-hosted Looker instances with extensions installed. Successful exploitation could allow attackers to execute arbitrary scripts in the context of Looker administrators, leading to potential data breaches, unauthorized data manipulation, and disruption of analytics operations. Given Looker's role in business intelligence, compromised admin accounts could expose sensitive corporate data, including financial, operational, and customer information. The requirement for viewer-level access to craft the malicious URL means insider threats or compromised low-privilege accounts could escalate attacks. The need for an admin to open the malicious URL implies some user interaction, but targeted phishing or social engineering campaigns could facilitate this. The impact on confidentiality, integrity, and availability is high, potentially affecting compliance with GDPR and other data protection regulations in Europe. Organizations relying on Looker for critical decision-making and reporting could face operational disruptions and reputational damage if exploited.
Mitigation Recommendations
European organizations should immediately identify whether they operate self-hosted Looker instances and verify the installed version. If running vulnerable versions prior to 24.18.201 or the listed patched releases, they must prioritize upgrading to the latest patched versions available from the official Looker download page. Additionally, organizations should audit installed Looker extensions and disable any unnecessary or untrusted extensions to reduce the attack surface. Implement strict access controls and monitor viewer-level accounts for suspicious activity, as these accounts can be leveraged to craft malicious URLs. Educate Looker administrators about the risk of opening untrusted URLs, especially those received via email or messaging platforms. Employ web filtering and email security solutions to detect and block phishing attempts that might deliver malicious URLs. Finally, consider implementing Content Security Policy (CSP) headers and other browser-based mitigations to limit the impact of potential XSS attacks within the Looker environment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2025-12739: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Google Cloud Looker
Description
An attacker with viewer permissions in Looker could craft a malicious URL that, when opened by a Looker admin, would execute an attacker-supplied script. Exploitation required at least one Looker extension installed on the instance. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.18.201+ * 25.0.79+ * 25.6.66+ * 25.12.7+ * 25.16.0+ * 25.18.0+ * 25.20.0+
AI-Powered Analysis
Technical Analysis
CVE-2025-12739 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting Google Cloud Looker, a business intelligence and data analytics platform. The flaw arises from improper neutralization of input during web page generation, allowing an attacker with viewer-level permissions to craft a malicious URL. When this URL is opened by a Looker administrator, it executes attacker-supplied scripts within the admin's browser context. This can lead to session hijacking, credential theft, or unauthorized actions performed with admin privileges. Exploitation requires that at least one Looker extension is installed on the instance, which increases the attack surface by enabling injection points. Both Looker-hosted and self-hosted deployments were vulnerable; however, Google has already mitigated the issue in Looker-hosted environments, requiring no user action. Self-hosted instances remain at risk unless upgraded to patched versions starting from 24.18.201 and above. The vulnerability has a CVSS 4.0 base score of 7.3, indicating high severity due to network attack vector, low attack complexity, partial privileges required, and user interaction needed. The impact on confidentiality, integrity, and availability is high because an attacker can execute arbitrary scripts in an admin context, potentially compromising sensitive data and administrative controls. No known exploits have been reported in the wild, but the presence of extensions and viewer permissions makes targeted attacks feasible. Organizations should verify their Looker deployment type and version, assess installed extensions, and apply updates promptly to mitigate risk.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to those using self-hosted Looker instances with extensions installed. Successful exploitation could allow attackers to execute arbitrary scripts in the context of Looker administrators, leading to potential data breaches, unauthorized data manipulation, and disruption of analytics operations. Given Looker's role in business intelligence, compromised admin accounts could expose sensitive corporate data, including financial, operational, and customer information. The requirement for viewer-level access to craft the malicious URL means insider threats or compromised low-privilege accounts could escalate attacks. The need for an admin to open the malicious URL implies some user interaction, but targeted phishing or social engineering campaigns could facilitate this. The impact on confidentiality, integrity, and availability is high, potentially affecting compliance with GDPR and other data protection regulations in Europe. Organizations relying on Looker for critical decision-making and reporting could face operational disruptions and reputational damage if exploited.
Mitigation Recommendations
European organizations should immediately identify whether they operate self-hosted Looker instances and verify the installed version. If running vulnerable versions prior to 24.18.201 or the listed patched releases, they must prioritize upgrading to the latest patched versions available from the official Looker download page. Additionally, organizations should audit installed Looker extensions and disable any unnecessary or untrusted extensions to reduce the attack surface. Implement strict access controls and monitor viewer-level accounts for suspicious activity, as these accounts can be leveraged to craft malicious URLs. Educate Looker administrators about the risk of opening untrusted URLs, especially those received via email or messaging platforms. Employ web filtering and email security solutions to detect and block phishing attempts that might deliver malicious URLs. Finally, consider implementing Content Security Policy (CSP) headers and other browser-based mitigations to limit the impact of potential XSS attacks within the Looker environment.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GoogleCloud
- Date Reserved
- 2025-11-05T10:43:57.797Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69242f303dd5bbb718bbea47
Added to database: 11/24/2025, 10:10:56 AM
Last enriched: 12/1/2025, 10:21:42 AM
Last updated: 1/8/2026, 2:31:54 PM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-21895: CWE-703: Improper Check or Handling of Exceptional Conditions in RustCrypto RSA
LowCVE-2025-8307: CWE-257 Storing Passwords in a Recoverable Format in Asseco InfoMedica Plus
MediumCVE-2025-8306: CWE-1220 Insufficient Granularity of Access Control in Asseco InfoMedica Plus
MediumCVE-2025-14025: Incorrect Execution-Assigned Permissions in Red Hat Red Hat Ansible Automation Platform 2
HighCVE-2026-21891: CWE-287: Improper Authentication in IceWhaleTech ZimaOS
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.