CVE-2025-12742: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Google Cloud Looker
A Looker user with a Developer role could cause Looker to execute a malicious command, due to insecure processing of Teradata driver parameters. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.108+ * 24.18.200+ * 25.0.78+ * 25.6.65+ * 25.8.47+ * 25.12.10+ * 25.14+
AI Analysis
Technical Summary
CVE-2025-12742 is an OS command injection vulnerability classified under CWE-78 found in Google Cloud Looker, specifically in the handling of Teradata driver parameters. The flaw allows a user with Developer role permissions to inject malicious OS commands due to improper neutralization of special elements in input parameters. This vulnerability affects both Looker-hosted and self-hosted instances; however, Google has already mitigated the issue in Looker-hosted environments, requiring no user intervention. Self-hosted instances remain vulnerable until upgraded to patched versions starting from 24.12.108 and later. The vulnerability's CVSS 4.0 vector (AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H) indicates network attack vector, high attack complexity, partial attack prerequisites, and high impact on confidentiality, integrity, and availability. Exploitation requires authenticated users with Developer role privileges, which limits the attack surface but still poses a serious risk if such credentials are compromised or misused. The vulnerability could lead to arbitrary command execution on the underlying OS, potentially allowing attackers to escalate privileges, exfiltrate sensitive data, or disrupt services. No public exploits have been reported yet, but the presence of this vulnerability in critical analytics infrastructure warrants immediate attention. The issue was reserved and published in November 2025, reflecting recent discovery and disclosure.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, particularly for those relying on self-hosted Looker instances for business intelligence and data analytics. Successful exploitation could lead to unauthorized command execution on servers hosting Looker, risking data confidentiality breaches, integrity violations, and service availability disruptions. This could result in exposure of sensitive business data, manipulation or deletion of analytics results, and potential lateral movement within corporate networks. Industries with stringent data protection requirements, such as finance, healthcare, and telecommunications, could face regulatory repercussions under GDPR if data is compromised. Additionally, operational disruptions could affect decision-making processes reliant on Looker dashboards and reports. Since exploitation requires Developer role access, insider threats or compromised credentials pose a critical risk vector. The lack of user interaction needed for exploitation increases the threat level once credentials are obtained. Overall, the vulnerability threatens core analytics infrastructure, which is increasingly strategic for European enterprises’ digital operations and competitive advantage.
Mitigation Recommendations
European organizations using self-hosted Looker must prioritize upgrading to the patched versions listed (24.12.108+, 24.18.200+, 25.0.78+, 25.6.65+, 25.8.47+, 25.12.10+, 25.14+) immediately to remediate this vulnerability. Beyond patching, organizations should audit and restrict Developer role assignments to the minimum necessary personnel, implementing strict role-based access controls and monitoring for anomalous activity. Employing multi-factor authentication (MFA) for all privileged accounts reduces the risk of credential compromise. Network segmentation should isolate Looker servers from broader enterprise networks to limit lateral movement in case of exploitation. Regularly review and sanitize all Teradata driver parameters and inputs to Looker, applying input validation and sanitization best practices where possible. Implement comprehensive logging and alerting on command execution attempts and unusual Looker activity. Conduct penetration testing and vulnerability assessments post-patching to verify remediation effectiveness. Finally, maintain up-to-date incident response plans tailored to analytics platform compromises.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Switzerland, Ireland, Belgium
CVE-2025-12742: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Google Cloud Looker
Description
A Looker user with a Developer role could cause Looker to execute a malicious command, due to insecure processing of Teradata driver parameters. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.108+ * 24.18.200+ * 25.0.78+ * 25.6.65+ * 25.8.47+ * 25.12.10+ * 25.14+
AI-Powered Analysis
Technical Analysis
CVE-2025-12742 is an OS command injection vulnerability classified under CWE-78 found in Google Cloud Looker, specifically in the handling of Teradata driver parameters. The flaw allows a user with Developer role permissions to inject malicious OS commands due to improper neutralization of special elements in input parameters. This vulnerability affects both Looker-hosted and self-hosted instances; however, Google has already mitigated the issue in Looker-hosted environments, requiring no user intervention. Self-hosted instances remain vulnerable until upgraded to patched versions starting from 24.12.108 and later. The vulnerability's CVSS 4.0 vector (AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H) indicates network attack vector, high attack complexity, partial attack prerequisites, and high impact on confidentiality, integrity, and availability. Exploitation requires authenticated users with Developer role privileges, which limits the attack surface but still poses a serious risk if such credentials are compromised or misused. The vulnerability could lead to arbitrary command execution on the underlying OS, potentially allowing attackers to escalate privileges, exfiltrate sensitive data, or disrupt services. No public exploits have been reported yet, but the presence of this vulnerability in critical analytics infrastructure warrants immediate attention. The issue was reserved and published in November 2025, reflecting recent discovery and disclosure.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, particularly for those relying on self-hosted Looker instances for business intelligence and data analytics. Successful exploitation could lead to unauthorized command execution on servers hosting Looker, risking data confidentiality breaches, integrity violations, and service availability disruptions. This could result in exposure of sensitive business data, manipulation or deletion of analytics results, and potential lateral movement within corporate networks. Industries with stringent data protection requirements, such as finance, healthcare, and telecommunications, could face regulatory repercussions under GDPR if data is compromised. Additionally, operational disruptions could affect decision-making processes reliant on Looker dashboards and reports. Since exploitation requires Developer role access, insider threats or compromised credentials pose a critical risk vector. The lack of user interaction needed for exploitation increases the threat level once credentials are obtained. Overall, the vulnerability threatens core analytics infrastructure, which is increasingly strategic for European enterprises’ digital operations and competitive advantage.
Mitigation Recommendations
European organizations using self-hosted Looker must prioritize upgrading to the patched versions listed (24.12.108+, 24.18.200+, 25.0.78+, 25.6.65+, 25.8.47+, 25.12.10+, 25.14+) immediately to remediate this vulnerability. Beyond patching, organizations should audit and restrict Developer role assignments to the minimum necessary personnel, implementing strict role-based access controls and monitoring for anomalous activity. Employing multi-factor authentication (MFA) for all privileged accounts reduces the risk of credential compromise. Network segmentation should isolate Looker servers from broader enterprise networks to limit lateral movement in case of exploitation. Regularly review and sanitize all Teradata driver parameters and inputs to Looker, applying input validation and sanitization best practices where possible. Implement comprehensive logging and alerting on command execution attempts and unusual Looker activity. Conduct penetration testing and vulnerability assessments post-patching to verify remediation effectiveness. Finally, maintain up-to-date incident response plans tailored to analytics platform compromises.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GoogleCloud
- Date Reserved
- 2025-11-05T10:50:53.509Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6925421a441560fe7ee98db1
Added to database: 11/25/2025, 5:43:54 AM
Last enriched: 11/25/2025, 5:57:15 AM
Last updated: 11/25/2025, 6:48:05 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13644: CWE-617: Reachable Assertion in MongoDB Inc. MongoDB Server
MediumCVE-2025-13643: CWE-862: Missing Authorization in MongoDB Inc. MongoDB Server
LowCVE-2025-12893: CWE-295 Improper Certificate Validation in MongoDB Inc. MongoDB Server
MediumCVE-2025-64730: Cross-site scripting (XSS) in Sony Corporation SNC-CX600W
MediumCVE-2025-62497: Cross-site request forgery (CSRF) in Sony Corporation SNC-CX600W
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.