CVE-2025-12743: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Google Cloud Looker
The Looker endpoint for generating new projects from database connections allows users to specify "looker" as a connection name, which is a reserved internal name for Looker's internal MySQL database. The schemas parameter is vulnerable to SQL injection, enabling attackers to manipulate SELECT queries that are constructed and executed against the internal MySQL database. This vulnerability allows users with developer permissions to extract data from Looker's internal MySQL database. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect against this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.106 * 24.18.198+ * 25.0.75 * 25.6.63+ * 25.8.45+ * 25.10.33+ * 25.12.1+ * 25.14+
AI Analysis
Technical Summary
CVE-2025-12743 is a SQL injection vulnerability classified under CWE-89 that impacts Google Cloud Looker, specifically in the endpoint responsible for generating new projects from database connections. The issue arises because the 'schemas' parameter is improperly sanitized, allowing attackers to inject malicious SQL commands into SELECT queries executed against Looker's internal MySQL database. The vulnerability is exacerbated by the ability to specify 'looker' as a connection name, which is reserved for Looker's internal database, thus enabling unauthorized access to internal data structures. This flaw requires the attacker to have developer-level permissions within Looker, limiting the attack surface but still posing a significant risk of data exfiltration from the internal database. Both Looker-hosted and self-hosted deployments were found vulnerable; however, Google has already mitigated this issue in Looker-hosted instances, requiring no user action there. Self-hosted instances remain at risk until upgraded to patched versions, which include 24.12.106, 24.18.198+, 25.0.75, 25.6.63+, 25.8.45+, 25.10.33+, 25.12.1+, and 25.14+. The vulnerability has a CVSS 4.0 base score of 6.0, indicating medium severity due to network attack vector, low attack complexity, and required privileges but no user interaction. No known exploits are currently reported in the wild.
Potential Impact
For European organizations using self-hosted Google Cloud Looker, this vulnerability poses a risk of unauthorized data disclosure from Looker's internal MySQL database. Since Looker is often used for business intelligence and analytics, sensitive corporate data, including internal metrics, user information, or proprietary analytics, could be exposed. The requirement for developer-level permissions reduces the likelihood of external attackers exploiting this vulnerability directly; however, insider threats or compromised developer accounts could lead to significant data breaches. The impact on confidentiality is high, while integrity and availability are less affected. Organizations relying on Looker for critical decision-making may face operational risks if sensitive data is leaked or manipulated. Compliance with GDPR and other European data protection regulations could be jeopardized if personal or sensitive data is exposed, leading to legal and financial consequences.
Mitigation Recommendations
European organizations operating self-hosted Looker instances must prioritize upgrading to the patched versions listed by Google immediately to remediate the vulnerability. Additionally, organizations should audit and restrict developer permissions to only trusted personnel, implement robust access controls, and monitor Looker logs for unusual query patterns that may indicate exploitation attempts. Employ network segmentation to isolate Looker internal databases from broader network access. Regularly review and update security policies around database connection naming conventions to prevent misuse of reserved names like 'looker'. Conduct internal penetration testing focusing on SQL injection vectors within Looker environments. Finally, ensure that incident response plans include scenarios involving insider threats and data exfiltration through BI tools.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-12743: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Google Cloud Looker
Description
The Looker endpoint for generating new projects from database connections allows users to specify "looker" as a connection name, which is a reserved internal name for Looker's internal MySQL database. The schemas parameter is vulnerable to SQL injection, enabling attackers to manipulate SELECT queries that are constructed and executed against the internal MySQL database. This vulnerability allows users with developer permissions to extract data from Looker's internal MySQL database. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect against this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.106 * 24.18.198+ * 25.0.75 * 25.6.63+ * 25.8.45+ * 25.10.33+ * 25.12.1+ * 25.14+
AI-Powered Analysis
Technical Analysis
CVE-2025-12743 is a SQL injection vulnerability classified under CWE-89 that impacts Google Cloud Looker, specifically in the endpoint responsible for generating new projects from database connections. The issue arises because the 'schemas' parameter is improperly sanitized, allowing attackers to inject malicious SQL commands into SELECT queries executed against Looker's internal MySQL database. The vulnerability is exacerbated by the ability to specify 'looker' as a connection name, which is reserved for Looker's internal database, thus enabling unauthorized access to internal data structures. This flaw requires the attacker to have developer-level permissions within Looker, limiting the attack surface but still posing a significant risk of data exfiltration from the internal database. Both Looker-hosted and self-hosted deployments were found vulnerable; however, Google has already mitigated this issue in Looker-hosted instances, requiring no user action there. Self-hosted instances remain at risk until upgraded to patched versions, which include 24.12.106, 24.18.198+, 25.0.75, 25.6.63+, 25.8.45+, 25.10.33+, 25.12.1+, and 25.14+. The vulnerability has a CVSS 4.0 base score of 6.0, indicating medium severity due to network attack vector, low attack complexity, and required privileges but no user interaction. No known exploits are currently reported in the wild.
Potential Impact
For European organizations using self-hosted Google Cloud Looker, this vulnerability poses a risk of unauthorized data disclosure from Looker's internal MySQL database. Since Looker is often used for business intelligence and analytics, sensitive corporate data, including internal metrics, user information, or proprietary analytics, could be exposed. The requirement for developer-level permissions reduces the likelihood of external attackers exploiting this vulnerability directly; however, insider threats or compromised developer accounts could lead to significant data breaches. The impact on confidentiality is high, while integrity and availability are less affected. Organizations relying on Looker for critical decision-making may face operational risks if sensitive data is leaked or manipulated. Compliance with GDPR and other European data protection regulations could be jeopardized if personal or sensitive data is exposed, leading to legal and financial consequences.
Mitigation Recommendations
European organizations operating self-hosted Looker instances must prioritize upgrading to the patched versions listed by Google immediately to remediate the vulnerability. Additionally, organizations should audit and restrict developer permissions to only trusted personnel, implement robust access controls, and monitor Looker logs for unusual query patterns that may indicate exploitation attempts. Employ network segmentation to isolate Looker internal databases from broader network access. Regularly review and update security policies around database connection naming conventions to prevent misuse of reserved names like 'looker'. Conduct internal penetration testing focusing on SQL injection vectors within Looker environments. Finally, ensure that incident response plans include scenarios involving insider threats and data exfiltration through BI tools.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GoogleCloud
- Date Reserved
- 2025-11-05T10:51:12.658Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691df5b8cb9b476b7d56e485
Added to database: 11/19/2025, 4:52:08 PM
Last enriched: 11/19/2025, 5:08:03 PM
Last updated: 11/19/2025, 5:55:35 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65034: CWE-639: Authorization Bypass Through User-Controlled Key in lukevella rallly
HighCVE-2025-65033: CWE-285: Improper Authorization in lukevella rallly
HighCVE-2025-65032: CWE-639: Authorization Bypass Through User-Controlled Key in lukevella rallly
MediumCVE-2025-65031: CWE-285: Improper Authorization in lukevella rallly
MediumCVE-2025-65030: CWE-285: Improper Authorization in lukevella rallly
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.