Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12739: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Google Cloud Looker

0
High
VulnerabilityCVE-2025-12739cvecve-2025-12739cwe-79
Published: Mon Nov 24 2025 (11/24/2025, 09:11:38 UTC)
Source: CVE Database V5
Vendor/Project: Google Cloud
Product: Looker

Description

An attacker with viewer permissions in Looker could craft a malicious URL that, when opened by a Looker admin, would execute an attacker-supplied script. Exploitation required at least one Looker extension installed on the instance. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.18.201+ * 25.0.79+ * 25.6.66+ * 25.12.7+ * 25.16.0+ * 25.18.0+ * 25.20.0+

AI-Powered Analysis

AILast updated: 12/01/2025, 10:21:42 UTC

Technical Analysis

CVE-2025-12739 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting Google Cloud Looker, a business intelligence and data analytics platform. The flaw arises from improper neutralization of input during web page generation, allowing an attacker with viewer-level permissions to craft a malicious URL. When this URL is opened by a Looker administrator, it executes attacker-supplied scripts within the admin's browser context. This can lead to session hijacking, credential theft, or unauthorized actions performed with admin privileges. Exploitation requires that at least one Looker extension is installed on the instance, which increases the attack surface by enabling injection points. Both Looker-hosted and self-hosted deployments were vulnerable; however, Google has already mitigated the issue in Looker-hosted environments, requiring no user action. Self-hosted instances remain at risk unless upgraded to patched versions starting from 24.18.201 and above. The vulnerability has a CVSS 4.0 base score of 7.3, indicating high severity due to network attack vector, low attack complexity, partial privileges required, and user interaction needed. The impact on confidentiality, integrity, and availability is high because an attacker can execute arbitrary scripts in an admin context, potentially compromising sensitive data and administrative controls. No known exploits have been reported in the wild, but the presence of extensions and viewer permissions makes targeted attacks feasible. Organizations should verify their Looker deployment type and version, assess installed extensions, and apply updates promptly to mitigate risk.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to those using self-hosted Looker instances with extensions installed. Successful exploitation could allow attackers to execute arbitrary scripts in the context of Looker administrators, leading to potential data breaches, unauthorized data manipulation, and disruption of analytics operations. Given Looker's role in business intelligence, compromised admin accounts could expose sensitive corporate data, including financial, operational, and customer information. The requirement for viewer-level access to craft the malicious URL means insider threats or compromised low-privilege accounts could escalate attacks. The need for an admin to open the malicious URL implies some user interaction, but targeted phishing or social engineering campaigns could facilitate this. The impact on confidentiality, integrity, and availability is high, potentially affecting compliance with GDPR and other data protection regulations in Europe. Organizations relying on Looker for critical decision-making and reporting could face operational disruptions and reputational damage if exploited.

Mitigation Recommendations

European organizations should immediately identify whether they operate self-hosted Looker instances and verify the installed version. If running vulnerable versions prior to 24.18.201 or the listed patched releases, they must prioritize upgrading to the latest patched versions available from the official Looker download page. Additionally, organizations should audit installed Looker extensions and disable any unnecessary or untrusted extensions to reduce the attack surface. Implement strict access controls and monitor viewer-level accounts for suspicious activity, as these accounts can be leveraged to craft malicious URLs. Educate Looker administrators about the risk of opening untrusted URLs, especially those received via email or messaging platforms. Employ web filtering and email security solutions to detect and block phishing attempts that might deliver malicious URLs. Finally, consider implementing Content Security Policy (CSP) headers and other browser-based mitigations to limit the impact of potential XSS attacks within the Looker environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GoogleCloud
Date Reserved
2025-11-05T10:43:57.797Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69242f303dd5bbb718bbea47

Added to database: 11/24/2025, 10:10:56 AM

Last enriched: 12/1/2025, 10:21:42 AM

Last updated: 1/8/2026, 2:31:54 PM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats