CVE-2025-12742: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Google Cloud Looker
A Looker user with a Developer role could cause Looker to execute a malicious command, due to insecure processing of Teradata driver parameters. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.108+ * 24.18.200+ * 25.0.78+ * 25.6.65+ * 25.8.47+ * 25.12.10+ * 25.14+
AI Analysis
Technical Summary
CVE-2025-12742 is an OS command injection vulnerability classified under CWE-78, discovered in Google Cloud Looker, a business intelligence and data analytics platform. The flaw arises from improper neutralization of special elements in the processing of Teradata driver parameters, which allows a user with Developer role privileges to inject and execute arbitrary operating system commands on the underlying server. Both Looker-hosted and self-hosted instances were initially vulnerable; however, Google has already mitigated the issue for Looker-hosted environments, requiring no user intervention. Self-hosted instances remain at risk until upgraded to patched versions. The vulnerability's CVSS 4.0 vector (AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/U:Red) indicates a network attack vector with high complexity, requiring partial authentication and high privileges, and causing high impact on confidentiality, integrity, and availability. Exploiting this vulnerability could allow an attacker to execute arbitrary commands, potentially leading to data breaches, system compromise, or disruption of analytics services. The issue specifically involves insecure handling of Teradata driver parameters, which are used to connect Looker to Teradata databases, a common enterprise data warehouse solution. The vendor has released patched versions (24.12.108+, 24.18.200+, 25.0.78+, 25.6.65+, 25.8.47+, 25.12.10+, 25.14+) to remediate the vulnerability. No known exploits have been reported in the wild to date, but the severity and ease of exploitation by privileged users make timely patching critical.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for enterprises relying on self-hosted Looker deployments integrated with Teradata databases. Successful exploitation could lead to unauthorized command execution on analytics servers, resulting in data exfiltration, manipulation of business intelligence reports, or disruption of critical data services. This could compromise sensitive business data, violate data protection regulations such as GDPR, and damage organizational reputation. The high privileges required limit the attack surface to trusted users, but insider threats or compromised developer accounts could be leveraged. The impact extends to availability if attackers disrupt analytics operations, potentially affecting decision-making processes. Given the widespread use of Looker in finance, manufacturing, and telecommunications sectors across Europe, the vulnerability could affect critical infrastructure and data-driven services. Organizations failing to patch may face regulatory scrutiny and operational risks.
Mitigation Recommendations
European organizations using self-hosted Looker instances must urgently upgrade to one of the patched versions provided by Google Cloud (24.12.108+, 24.18.200+, 25.0.78+, 25.6.65+, 25.8.47+, 25.12.10+, 25.14+). Beyond patching, organizations should audit and restrict Developer role assignments to trusted personnel only, implementing strict role-based access controls. Monitoring and logging of Looker user activities, especially those with elevated privileges, should be enhanced to detect anomalous command executions or parameter manipulations. Network segmentation can limit access to Looker servers, reducing exposure. Additionally, organizations should review Teradata driver configurations and sanitize inputs where possible. Regular vulnerability scanning and penetration testing focused on analytics platforms can help identify residual risks. Finally, integrating Looker security posture into broader cloud security frameworks and incident response plans will improve resilience against exploitation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Switzerland, Ireland
CVE-2025-12742: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Google Cloud Looker
Description
A Looker user with a Developer role could cause Looker to execute a malicious command, due to insecure processing of Teradata driver parameters. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.108+ * 24.18.200+ * 25.0.78+ * 25.6.65+ * 25.8.47+ * 25.12.10+ * 25.14+
AI-Powered Analysis
Technical Analysis
CVE-2025-12742 is an OS command injection vulnerability classified under CWE-78, discovered in Google Cloud Looker, a business intelligence and data analytics platform. The flaw arises from improper neutralization of special elements in the processing of Teradata driver parameters, which allows a user with Developer role privileges to inject and execute arbitrary operating system commands on the underlying server. Both Looker-hosted and self-hosted instances were initially vulnerable; however, Google has already mitigated the issue for Looker-hosted environments, requiring no user intervention. Self-hosted instances remain at risk until upgraded to patched versions. The vulnerability's CVSS 4.0 vector (AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/U:Red) indicates a network attack vector with high complexity, requiring partial authentication and high privileges, and causing high impact on confidentiality, integrity, and availability. Exploiting this vulnerability could allow an attacker to execute arbitrary commands, potentially leading to data breaches, system compromise, or disruption of analytics services. The issue specifically involves insecure handling of Teradata driver parameters, which are used to connect Looker to Teradata databases, a common enterprise data warehouse solution. The vendor has released patched versions (24.12.108+, 24.18.200+, 25.0.78+, 25.6.65+, 25.8.47+, 25.12.10+, 25.14+) to remediate the vulnerability. No known exploits have been reported in the wild to date, but the severity and ease of exploitation by privileged users make timely patching critical.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for enterprises relying on self-hosted Looker deployments integrated with Teradata databases. Successful exploitation could lead to unauthorized command execution on analytics servers, resulting in data exfiltration, manipulation of business intelligence reports, or disruption of critical data services. This could compromise sensitive business data, violate data protection regulations such as GDPR, and damage organizational reputation. The high privileges required limit the attack surface to trusted users, but insider threats or compromised developer accounts could be leveraged. The impact extends to availability if attackers disrupt analytics operations, potentially affecting decision-making processes. Given the widespread use of Looker in finance, manufacturing, and telecommunications sectors across Europe, the vulnerability could affect critical infrastructure and data-driven services. Organizations failing to patch may face regulatory scrutiny and operational risks.
Mitigation Recommendations
European organizations using self-hosted Looker instances must urgently upgrade to one of the patched versions provided by Google Cloud (24.12.108+, 24.18.200+, 25.0.78+, 25.6.65+, 25.8.47+, 25.12.10+, 25.14+). Beyond patching, organizations should audit and restrict Developer role assignments to trusted personnel only, implementing strict role-based access controls. Monitoring and logging of Looker user activities, especially those with elevated privileges, should be enhanced to detect anomalous command executions or parameter manipulations. Network segmentation can limit access to Looker servers, reducing exposure. Additionally, organizations should review Teradata driver configurations and sanitize inputs where possible. Regular vulnerability scanning and penetration testing focused on analytics platforms can help identify residual risks. Finally, integrating Looker security posture into broader cloud security frameworks and incident response plans will improve resilience against exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GoogleCloud
- Date Reserved
- 2025-11-05T10:50:53.509Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6925421a441560fe7ee98db1
Added to database: 11/25/2025, 5:43:54 AM
Last enriched: 12/2/2025, 6:24:57 AM
Last updated: 1/10/2026, 10:15:03 PM
Views: 77
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.