Home

Description

A Looker user with a Developer role could cause Looker to execute a malicious command, due to insecure processing of Teradata driver parameters. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.108+ * 24.18.200+ * 25.0.78+ * 25.6.65+ * 25.8.47+ * 25.12.10+ * 25.14+

PUBLISHED Reserved 2025-11-05 | Published 2025-11-25 | Updated 2025-11-25 | Assigner GoogleCloud




HIGH: 7.5CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/U:Red

Problem types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unaffected

Any version before 24.12.108
affected

Any version before 24.18.200
affected

Any version before 25.0.78
affected

Any version before 25.6.65
affected

Any version before 25.8.47
affected

Any version before 25.12.10
affected

Any version before 25.14
affected

Default status
unaffected

Any version before 24.12.108
affected

Any version before 24.18.200
affected

Any version before 25.0.78
affected

Any version before 25.6.65
affected

Any version before 25.8.47
affected

Any version before 25.12.10
affected

Any version before 25.14
affected

Credits

Sivanesh Ashok finder

Sreeram KL finder

References

cloud.google.com/support/bulletins

cve.org (CVE-2025-12742)

nvd.nist.gov (CVE-2025-12742)

Download JSON