CVE-2025-12739: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Google Cloud Looker
An attacker with viewer permissions in Looker could craft a malicious URL that, when opened by a Looker admin, would execute an attacker-supplied script. Exploitation required at least one Looker extension installed on the instance. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.18.201+ * 25.0.79+ * 25.6.66+ * 25.12.7+ * 25.16.0+ * 25.18.0+ * 25.20.0+
AI Analysis
Technical Summary
CVE-2025-12739 is a cross-site scripting (XSS) vulnerability classified under CWE-79 found in Google Cloud Looker, a business intelligence and data analytics platform. The flaw arises from improper neutralization of input during web page generation, allowing an attacker with viewer-level permissions to craft a malicious URL. When this URL is opened by a Looker administrator, the embedded attacker-controlled script executes in the context of the admin’s browser session. This can lead to unauthorized actions, data theft, or session hijacking. The vulnerability specifically requires that at least one Looker extension is installed on the instance, which broadens the attack surface by enabling script injection vectors. Both Looker-hosted and self-hosted instances were initially vulnerable; however, Google has mitigated the issue for Looker-hosted environments automatically, requiring no user action. Self-hosted instances remain vulnerable until upgraded to patched versions starting from 24.18.201 and above, including subsequent releases like 25.0.79, 25.6.66, and others. The CVSS 4.0 base score of 7.3 reflects high severity due to network attack vector, low attack complexity, partial privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability’s nature and ease of exploitation make it a significant risk, especially in environments with multiple users and administrative roles.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. Looker is widely used for data analytics and business intelligence, often handling sensitive corporate and customer data. Exploitation could allow attackers to execute arbitrary scripts in the context of an administrator, potentially leading to data exfiltration, unauthorized configuration changes, or pivoting to other internal systems. This compromises confidentiality, integrity, and availability of critical business data and analytics workflows. Organizations in regulated sectors such as finance, healthcare, and government are particularly at risk due to compliance requirements around data protection (e.g., GDPR). The need for an admin to open a malicious URL means social engineering or phishing could be leveraged, increasing the risk in environments with less stringent user awareness training. The vulnerability also poses reputational and operational risks if exploited, potentially causing service disruptions or data breaches.
Mitigation Recommendations
European organizations running self-hosted Looker instances must prioritize upgrading to the patched versions listed (24.18.201+ and later). Beyond patching, organizations should audit and restrict the use of Looker extensions to only those necessary and from trusted sources to reduce attack surface. Implement strict access controls and monitoring on viewer and admin roles to detect unusual URL access or behavior. Employ web filtering and email security solutions to block or flag suspicious URLs that could be used in phishing attacks targeting Looker admins. Conduct targeted security awareness training for administrators about the risks of opening untrusted URLs. Additionally, enable logging and alerting on Looker admin activities to quickly identify potential exploitation attempts. Regularly review and update incident response plans to include scenarios involving Looker or similar BI platforms. Consider network segmentation to isolate Looker instances from broader corporate networks to limit lateral movement if compromised.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain
CVE-2025-12739: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Google Cloud Looker
Description
An attacker with viewer permissions in Looker could craft a malicious URL that, when opened by a Looker admin, would execute an attacker-supplied script. Exploitation required at least one Looker extension installed on the instance. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.18.201+ * 25.0.79+ * 25.6.66+ * 25.12.7+ * 25.16.0+ * 25.18.0+ * 25.20.0+
AI-Powered Analysis
Technical Analysis
CVE-2025-12739 is a cross-site scripting (XSS) vulnerability classified under CWE-79 found in Google Cloud Looker, a business intelligence and data analytics platform. The flaw arises from improper neutralization of input during web page generation, allowing an attacker with viewer-level permissions to craft a malicious URL. When this URL is opened by a Looker administrator, the embedded attacker-controlled script executes in the context of the admin’s browser session. This can lead to unauthorized actions, data theft, or session hijacking. The vulnerability specifically requires that at least one Looker extension is installed on the instance, which broadens the attack surface by enabling script injection vectors. Both Looker-hosted and self-hosted instances were initially vulnerable; however, Google has mitigated the issue for Looker-hosted environments automatically, requiring no user action. Self-hosted instances remain vulnerable until upgraded to patched versions starting from 24.18.201 and above, including subsequent releases like 25.0.79, 25.6.66, and others. The CVSS 4.0 base score of 7.3 reflects high severity due to network attack vector, low attack complexity, partial privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability’s nature and ease of exploitation make it a significant risk, especially in environments with multiple users and administrative roles.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. Looker is widely used for data analytics and business intelligence, often handling sensitive corporate and customer data. Exploitation could allow attackers to execute arbitrary scripts in the context of an administrator, potentially leading to data exfiltration, unauthorized configuration changes, or pivoting to other internal systems. This compromises confidentiality, integrity, and availability of critical business data and analytics workflows. Organizations in regulated sectors such as finance, healthcare, and government are particularly at risk due to compliance requirements around data protection (e.g., GDPR). The need for an admin to open a malicious URL means social engineering or phishing could be leveraged, increasing the risk in environments with less stringent user awareness training. The vulnerability also poses reputational and operational risks if exploited, potentially causing service disruptions or data breaches.
Mitigation Recommendations
European organizations running self-hosted Looker instances must prioritize upgrading to the patched versions listed (24.18.201+ and later). Beyond patching, organizations should audit and restrict the use of Looker extensions to only those necessary and from trusted sources to reduce attack surface. Implement strict access controls and monitoring on viewer and admin roles to detect unusual URL access or behavior. Employ web filtering and email security solutions to block or flag suspicious URLs that could be used in phishing attacks targeting Looker admins. Conduct targeted security awareness training for administrators about the risks of opening untrusted URLs. Additionally, enable logging and alerting on Looker admin activities to quickly identify potential exploitation attempts. Regularly review and update incident response plans to include scenarios involving Looker or similar BI platforms. Consider network segmentation to isolate Looker instances from broader corporate networks to limit lateral movement if compromised.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GoogleCloud
- Date Reserved
- 2025-11-05T10:43:57.797Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69242f303dd5bbb718bbea47
Added to database: 11/24/2025, 10:10:56 AM
Last enriched: 11/24/2025, 10:11:22 AM
Last updated: 11/24/2025, 12:05:37 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-41729: CWE-1287 Improper Validation of Specified Type of Input in Janitza UMG 96-PA
HighCVE-2025-41087: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Taclia Taclia's web application
MediumShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access
HighCVE-2025-13596: CWE-209 Generation of Error Message Containing Sensitive Information in ATISoluciones CIGES
LowCVE-2025-13588: Server-Side Request Forgery in lKinderBueno Streamity Xtream IPTV Player
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.