Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12743: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Google Cloud Looker

0
Medium
VulnerabilityCVE-2025-12743cvecve-2025-12743cwe-89
Published: Wed Nov 19 2025 (11/19/2025, 16:41:30 UTC)
Source: CVE Database V5
Vendor/Project: Google Cloud
Product: Looker

Description

The Looker endpoint for generating new projects from database connections allows users to specify "looker" as a connection name, which is a reserved internal name for Looker's internal MySQL database. The schemas parameter is vulnerable to SQL injection, enabling attackers to manipulate SELECT queries that are constructed and executed against the internal MySQL database. This vulnerability allows users with developer permissions to extract data from Looker's internal MySQL database. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect against this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.106 * 24.18.198+ * 25.0.75 * 25.6.63+ * 25.8.45+ * 25.10.33+ * 25.12.1+ * 25.14+

AI-Powered Analysis

AILast updated: 11/26/2025, 17:12:17 UTC

Technical Analysis

CVE-2025-12743 is an SQL injection vulnerability classified under CWE-89 found in Google Cloud Looker, specifically in the endpoint responsible for generating new projects from database connections. The flaw arises because the 'schemas' parameter is improperly sanitized, allowing attackers to inject malicious SQL commands into SELECT queries executed against Looker's internal MySQL database. The vulnerability is triggered when a user specifies 'looker' as the connection name, which is a reserved internal identifier for Looker's own database. This enables users with developer permissions to extract sensitive data from the internal database, potentially exposing configuration or operational data. Both Looker-hosted and self-hosted deployments were initially vulnerable; however, Google Cloud has already mitigated the issue in hosted environments, requiring no user action. Self-hosted instances remain at risk unless upgraded to patched versions, which include releases 24.12.106, 24.18.198+, 25.0.75, 25.6.63+, 25.8.45+, 25.10.33+, 25.12.1+, and 25.14+. The vulnerability has a CVSS 4.0 base score of 6.0, indicating medium severity, with an attack vector of network, low attack complexity, and requiring privileges at the developer level but no user interaction. The vulnerability impacts confidentiality by allowing unauthorized data extraction but does not affect integrity or availability. No known exploits have been reported in the wild, and the issue was publicly disclosed on November 19, 2025.

Potential Impact

For European organizations, the primary impact of CVE-2025-12743 is unauthorized data disclosure from Looker's internal MySQL database, which may contain sensitive configuration, metadata, or operational information. This could lead to further reconnaissance or targeted attacks if attackers gain developer-level access. The vulnerability does not directly compromise data integrity or availability but poses a confidentiality risk. Organizations using self-hosted Looker instances are at higher risk, especially if they have not applied the patches. Since Looker is commonly used for business intelligence and data analytics, exposure of internal data could undermine trust, violate data protection regulations such as GDPR, and lead to compliance issues. The requirement for developer permissions limits the attack surface but insider threats or compromised developer accounts could exploit this vulnerability. Given the lack of known exploits in the wild, the immediate risk is moderate but could escalate if exploit code becomes available.

Mitigation Recommendations

European organizations should immediately verify whether they operate self-hosted Looker instances and upgrade to the patched versions listed (24.12.106, 24.18.198+, 25.0.75, 25.6.63+, 25.8.45+, 25.10.33+, 25.12.1+, 25.14+). Restrict developer permissions strictly to trusted personnel and implement robust access controls and monitoring to detect unusual query patterns or data access. Employ network segmentation to limit access to Looker internal databases and enforce least privilege principles. Regularly audit Looker configurations and logs for signs of attempted exploitation. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the schemas parameter. Additionally, integrate Looker security updates into the organization's patch management lifecycle to ensure timely remediation of future vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GoogleCloud
Date Reserved
2025-11-05T10:51:12.658Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691df5b8cb9b476b7d56e485

Added to database: 11/19/2025, 4:52:08 PM

Last enriched: 11/26/2025, 5:12:17 PM

Last updated: 1/7/2026, 6:10:25 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats