CVE-2025-12743: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Google Cloud Looker
The Looker endpoint for generating new projects from database connections allows users to specify "looker" as a connection name, which is a reserved internal name for Looker's internal MySQL database. The schemas parameter is vulnerable to SQL injection, enabling attackers to manipulate SELECT queries that are constructed and executed against the internal MySQL database. This vulnerability allows users with developer permissions to extract data from Looker's internal MySQL database. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect against this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.106 * 24.18.198+ * 25.0.75 * 25.6.63+ * 25.8.45+ * 25.10.33+ * 25.12.1+ * 25.14+
AI Analysis
Technical Summary
CVE-2025-12743 is an SQL injection vulnerability classified under CWE-89 found in Google Cloud Looker, specifically in the endpoint responsible for generating new projects from database connections. The flaw arises because the 'schemas' parameter is improperly sanitized, allowing attackers to inject malicious SQL commands into SELECT queries executed against Looker's internal MySQL database. The vulnerability is triggered when a user specifies 'looker' as the connection name, which is a reserved internal identifier for Looker's own database. This enables users with developer permissions to extract sensitive data from the internal database, potentially exposing configuration or operational data. Both Looker-hosted and self-hosted deployments were initially vulnerable; however, Google Cloud has already mitigated the issue in hosted environments, requiring no user action. Self-hosted instances remain at risk unless upgraded to patched versions, which include releases 24.12.106, 24.18.198+, 25.0.75, 25.6.63+, 25.8.45+, 25.10.33+, 25.12.1+, and 25.14+. The vulnerability has a CVSS 4.0 base score of 6.0, indicating medium severity, with an attack vector of network, low attack complexity, and requiring privileges at the developer level but no user interaction. The vulnerability impacts confidentiality by allowing unauthorized data extraction but does not affect integrity or availability. No known exploits have been reported in the wild, and the issue was publicly disclosed on November 19, 2025.
Potential Impact
For European organizations, the primary impact of CVE-2025-12743 is unauthorized data disclosure from Looker's internal MySQL database, which may contain sensitive configuration, metadata, or operational information. This could lead to further reconnaissance or targeted attacks if attackers gain developer-level access. The vulnerability does not directly compromise data integrity or availability but poses a confidentiality risk. Organizations using self-hosted Looker instances are at higher risk, especially if they have not applied the patches. Since Looker is commonly used for business intelligence and data analytics, exposure of internal data could undermine trust, violate data protection regulations such as GDPR, and lead to compliance issues. The requirement for developer permissions limits the attack surface but insider threats or compromised developer accounts could exploit this vulnerability. Given the lack of known exploits in the wild, the immediate risk is moderate but could escalate if exploit code becomes available.
Mitigation Recommendations
European organizations should immediately verify whether they operate self-hosted Looker instances and upgrade to the patched versions listed (24.12.106, 24.18.198+, 25.0.75, 25.6.63+, 25.8.45+, 25.10.33+, 25.12.1+, 25.14+). Restrict developer permissions strictly to trusted personnel and implement robust access controls and monitoring to detect unusual query patterns or data access. Employ network segmentation to limit access to Looker internal databases and enforce least privilege principles. Regularly audit Looker configurations and logs for signs of attempted exploitation. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the schemas parameter. Additionally, integrate Looker security updates into the organization's patch management lifecycle to ensure timely remediation of future vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Switzerland, Belgium, Italy
CVE-2025-12743: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Google Cloud Looker
Description
The Looker endpoint for generating new projects from database connections allows users to specify "looker" as a connection name, which is a reserved internal name for Looker's internal MySQL database. The schemas parameter is vulnerable to SQL injection, enabling attackers to manipulate SELECT queries that are constructed and executed against the internal MySQL database. This vulnerability allows users with developer permissions to extract data from Looker's internal MySQL database. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect against this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.106 * 24.18.198+ * 25.0.75 * 25.6.63+ * 25.8.45+ * 25.10.33+ * 25.12.1+ * 25.14+
AI-Powered Analysis
Technical Analysis
CVE-2025-12743 is an SQL injection vulnerability classified under CWE-89 found in Google Cloud Looker, specifically in the endpoint responsible for generating new projects from database connections. The flaw arises because the 'schemas' parameter is improperly sanitized, allowing attackers to inject malicious SQL commands into SELECT queries executed against Looker's internal MySQL database. The vulnerability is triggered when a user specifies 'looker' as the connection name, which is a reserved internal identifier for Looker's own database. This enables users with developer permissions to extract sensitive data from the internal database, potentially exposing configuration or operational data. Both Looker-hosted and self-hosted deployments were initially vulnerable; however, Google Cloud has already mitigated the issue in hosted environments, requiring no user action. Self-hosted instances remain at risk unless upgraded to patched versions, which include releases 24.12.106, 24.18.198+, 25.0.75, 25.6.63+, 25.8.45+, 25.10.33+, 25.12.1+, and 25.14+. The vulnerability has a CVSS 4.0 base score of 6.0, indicating medium severity, with an attack vector of network, low attack complexity, and requiring privileges at the developer level but no user interaction. The vulnerability impacts confidentiality by allowing unauthorized data extraction but does not affect integrity or availability. No known exploits have been reported in the wild, and the issue was publicly disclosed on November 19, 2025.
Potential Impact
For European organizations, the primary impact of CVE-2025-12743 is unauthorized data disclosure from Looker's internal MySQL database, which may contain sensitive configuration, metadata, or operational information. This could lead to further reconnaissance or targeted attacks if attackers gain developer-level access. The vulnerability does not directly compromise data integrity or availability but poses a confidentiality risk. Organizations using self-hosted Looker instances are at higher risk, especially if they have not applied the patches. Since Looker is commonly used for business intelligence and data analytics, exposure of internal data could undermine trust, violate data protection regulations such as GDPR, and lead to compliance issues. The requirement for developer permissions limits the attack surface but insider threats or compromised developer accounts could exploit this vulnerability. Given the lack of known exploits in the wild, the immediate risk is moderate but could escalate if exploit code becomes available.
Mitigation Recommendations
European organizations should immediately verify whether they operate self-hosted Looker instances and upgrade to the patched versions listed (24.12.106, 24.18.198+, 25.0.75, 25.6.63+, 25.8.45+, 25.10.33+, 25.12.1+, 25.14+). Restrict developer permissions strictly to trusted personnel and implement robust access controls and monitoring to detect unusual query patterns or data access. Employ network segmentation to limit access to Looker internal databases and enforce least privilege principles. Regularly audit Looker configurations and logs for signs of attempted exploitation. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the schemas parameter. Additionally, integrate Looker security updates into the organization's patch management lifecycle to ensure timely remediation of future vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GoogleCloud
- Date Reserved
- 2025-11-05T10:51:12.658Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691df5b8cb9b476b7d56e485
Added to database: 11/19/2025, 4:52:08 PM
Last enriched: 11/26/2025, 5:12:17 PM
Last updated: 1/7/2026, 6:10:25 AM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.