Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12741: CWE-20 Improper Input Validation in Google Cloud Looker

0
High
VulnerabilityCVE-2025-12741cvecve-2025-12741cwe-20
Published: Mon Nov 24 2025 (11/24/2025, 11:35:33 UTC)
Source: CVE Database V5
Vendor/Project: Google Cloud
Product: Looker

Description

CVE-2025-12741 is a high-severity vulnerability in Google Cloud Looker affecting self-hosted instances. A user with Developer role can exploit improper input validation in LookML when creating a database connection using the Denodo driver to execute malicious commands. Looker-hosted instances have been mitigated and require no user action, but self-hosted deployments must upgrade to patched versions immediately. The vulnerability has a CVSS 4. 0 score of 7. 7, indicating high impact on confidentiality, integrity, and availability. No known exploits are currently in the wild. Organizations using self-hosted Looker should prioritize patching to prevent potential command injection attacks that could compromise sensitive data and system integrity.

AI-Powered Analysis

AILast updated: 12/01/2025, 13:18:53 UTC

Technical Analysis

CVE-2025-12741 is a vulnerability classified under CWE-20 (Improper Input Validation) found in Google Cloud Looker, specifically impacting self-hosted instances. The flaw allows a user assigned the Developer role to create a database connection using the Denodo driver and manipulate LookML code to execute arbitrary malicious commands on the underlying system. This occurs due to insufficient validation of user-supplied input within LookML configurations, enabling command injection. The vulnerability affects both Looker-hosted and self-hosted deployments; however, Google has already mitigated the issue in Looker-hosted environments, requiring no action from users. Self-hosted instances remain vulnerable unless upgraded to patched versions starting from 24.12.108 and later releases. The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), partial privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits have been reported yet, but the potential for severe damage exists if exploited, including unauthorized command execution, data compromise, and system disruption.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those operating self-hosted Looker instances for business intelligence and data analytics. Exploitation could lead to unauthorized command execution, resulting in data breaches, loss of data integrity, and potential service outages. Given Looker's role in handling sensitive business data, attackers could leverage this vulnerability to access confidential information or disrupt critical analytics workflows. The impact is heightened in sectors with strict data protection regulations such as GDPR, where data breaches can lead to substantial fines and reputational damage. Additionally, compromised analytics platforms could be used as pivot points for further network intrusion, increasing the overall threat landscape for affected organizations.

Mitigation Recommendations

European organizations using self-hosted Looker must urgently upgrade to the patched versions listed (24.12.108+, 24.18.200+, 25.0.78+, 25.6.65+, 25.8.47+, 25.12.10+, 25.14+). Beyond patching, restrict Developer role assignments strictly to trusted personnel and regularly audit role permissions to minimize risk exposure. Implement network segmentation to isolate Looker instances from critical infrastructure and monitor LookML changes for unusual or unauthorized modifications. Employ runtime application self-protection (RASP) or web application firewalls (WAF) capable of detecting command injection patterns. Conduct regular security training for developers and administrators on secure LookML practices. Finally, maintain comprehensive logging and alerting to detect suspicious activities promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GoogleCloud
Date Reserved
2025-11-05T10:50:34.070Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69244dd2911d225366056a7a

Added to database: 11/24/2025, 12:21:38 PM

Last enriched: 12/1/2025, 1:18:53 PM

Last updated: 1/8/2026, 6:02:46 PM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats