Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12743: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Google Cloud Looker

0
Medium
VulnerabilityCVE-2025-12743cvecve-2025-12743cwe-89
Published: Wed Nov 19 2025 (11/19/2025, 16:41:30 UTC)
Source: CVE Database V5
Vendor/Project: Google Cloud
Product: Looker

Description

The Looker endpoint for generating new projects from database connections allows users to specify "looker" as a connection name, which is a reserved internal name for Looker's internal MySQL database. The schemas parameter is vulnerable to SQL injection, enabling attackers to manipulate SELECT queries that are constructed and executed against the internal MySQL database. This vulnerability allows users with developer permissions to extract data from Looker's internal MySQL database. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect against this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.106 * 24.18.198+ * 25.0.75 * 25.6.63+ * 25.8.45+ * 25.10.33+ * 25.12.1+ * 25.14+

AI-Powered Analysis

AILast updated: 11/19/2025, 17:08:03 UTC

Technical Analysis

CVE-2025-12743 is a SQL injection vulnerability classified under CWE-89 that impacts Google Cloud Looker, specifically in the endpoint responsible for generating new projects from database connections. The issue arises because the 'schemas' parameter is improperly sanitized, allowing attackers to inject malicious SQL commands into SELECT queries executed against Looker's internal MySQL database. The vulnerability is exacerbated by the ability to specify 'looker' as a connection name, which is reserved for Looker's internal database, thus enabling unauthorized access to internal data structures. This flaw requires the attacker to have developer-level permissions within Looker, limiting the attack surface but still posing a significant risk of data exfiltration from the internal database. Both Looker-hosted and self-hosted deployments were found vulnerable; however, Google has already mitigated this issue in Looker-hosted instances, requiring no user action there. Self-hosted instances remain at risk until upgraded to patched versions, which include 24.12.106, 24.18.198+, 25.0.75, 25.6.63+, 25.8.45+, 25.10.33+, 25.12.1+, and 25.14+. The vulnerability has a CVSS 4.0 base score of 6.0, indicating medium severity due to network attack vector, low attack complexity, and required privileges but no user interaction. No known exploits are currently reported in the wild.

Potential Impact

For European organizations using self-hosted Google Cloud Looker, this vulnerability poses a risk of unauthorized data disclosure from Looker's internal MySQL database. Since Looker is often used for business intelligence and analytics, sensitive corporate data, including internal metrics, user information, or proprietary analytics, could be exposed. The requirement for developer-level permissions reduces the likelihood of external attackers exploiting this vulnerability directly; however, insider threats or compromised developer accounts could lead to significant data breaches. The impact on confidentiality is high, while integrity and availability are less affected. Organizations relying on Looker for critical decision-making may face operational risks if sensitive data is leaked or manipulated. Compliance with GDPR and other European data protection regulations could be jeopardized if personal or sensitive data is exposed, leading to legal and financial consequences.

Mitigation Recommendations

European organizations operating self-hosted Looker instances must prioritize upgrading to the patched versions listed by Google immediately to remediate the vulnerability. Additionally, organizations should audit and restrict developer permissions to only trusted personnel, implement robust access controls, and monitor Looker logs for unusual query patterns that may indicate exploitation attempts. Employ network segmentation to isolate Looker internal databases from broader network access. Regularly review and update security policies around database connection naming conventions to prevent misuse of reserved names like 'looker'. Conduct internal penetration testing focusing on SQL injection vectors within Looker environments. Finally, ensure that incident response plans include scenarios involving insider threats and data exfiltration through BI tools.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GoogleCloud
Date Reserved
2025-11-05T10:51:12.658Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691df5b8cb9b476b7d56e485

Added to database: 11/19/2025, 4:52:08 PM

Last enriched: 11/19/2025, 5:08:03 PM

Last updated: 11/19/2025, 5:55:35 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats