Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12742: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Google Cloud Looker

0
High
VulnerabilityCVE-2025-12742cvecve-2025-12742cwe-78
Published: Tue Nov 25 2025 (11/25/2025, 05:38:47 UTC)
Source: CVE Database V5
Vendor/Project: Google Cloud
Product: Looker

Description

A Looker user with a Developer role could cause Looker to execute a malicious command, due to insecure processing of Teradata driver parameters. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.108+ * 24.18.200+ * 25.0.78+ * 25.6.65+ * 25.8.47+ * 25.12.10+ * 25.14+

AI-Powered Analysis

AILast updated: 11/25/2025, 05:57:15 UTC

Technical Analysis

CVE-2025-12742 is an OS command injection vulnerability classified under CWE-78 found in Google Cloud Looker, specifically in the handling of Teradata driver parameters. The flaw allows a user with Developer role permissions to inject malicious OS commands due to improper neutralization of special elements in input parameters. This vulnerability affects both Looker-hosted and self-hosted instances; however, Google has already mitigated the issue in Looker-hosted environments, requiring no user intervention. Self-hosted instances remain vulnerable until upgraded to patched versions starting from 24.12.108 and later. The vulnerability's CVSS 4.0 vector (AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H) indicates network attack vector, high attack complexity, partial attack prerequisites, and high impact on confidentiality, integrity, and availability. Exploitation requires authenticated users with Developer role privileges, which limits the attack surface but still poses a serious risk if such credentials are compromised or misused. The vulnerability could lead to arbitrary command execution on the underlying OS, potentially allowing attackers to escalate privileges, exfiltrate sensitive data, or disrupt services. No public exploits have been reported yet, but the presence of this vulnerability in critical analytics infrastructure warrants immediate attention. The issue was reserved and published in November 2025, reflecting recent discovery and disclosure.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, particularly for those relying on self-hosted Looker instances for business intelligence and data analytics. Successful exploitation could lead to unauthorized command execution on servers hosting Looker, risking data confidentiality breaches, integrity violations, and service availability disruptions. This could result in exposure of sensitive business data, manipulation or deletion of analytics results, and potential lateral movement within corporate networks. Industries with stringent data protection requirements, such as finance, healthcare, and telecommunications, could face regulatory repercussions under GDPR if data is compromised. Additionally, operational disruptions could affect decision-making processes reliant on Looker dashboards and reports. Since exploitation requires Developer role access, insider threats or compromised credentials pose a critical risk vector. The lack of user interaction needed for exploitation increases the threat level once credentials are obtained. Overall, the vulnerability threatens core analytics infrastructure, which is increasingly strategic for European enterprises’ digital operations and competitive advantage.

Mitigation Recommendations

European organizations using self-hosted Looker must prioritize upgrading to the patched versions listed (24.12.108+, 24.18.200+, 25.0.78+, 25.6.65+, 25.8.47+, 25.12.10+, 25.14+) immediately to remediate this vulnerability. Beyond patching, organizations should audit and restrict Developer role assignments to the minimum necessary personnel, implementing strict role-based access controls and monitoring for anomalous activity. Employing multi-factor authentication (MFA) for all privileged accounts reduces the risk of credential compromise. Network segmentation should isolate Looker servers from broader enterprise networks to limit lateral movement in case of exploitation. Regularly review and sanitize all Teradata driver parameters and inputs to Looker, applying input validation and sanitization best practices where possible. Implement comprehensive logging and alerting on command execution attempts and unusual Looker activity. Conduct penetration testing and vulnerability assessments post-patching to verify remediation effectiveness. Finally, maintain up-to-date incident response plans tailored to analytics platform compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GoogleCloud
Date Reserved
2025-11-05T10:50:53.509Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6925421a441560fe7ee98db1

Added to database: 11/25/2025, 5:43:54 AM

Last enriched: 11/25/2025, 5:57:15 AM

Last updated: 11/25/2025, 6:48:05 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats