Home

Description

The Looker endpoint for generating new projects from database connections allows users to specify "looker" as a connection name, which is a reserved internal name for Looker's internal MySQL database. The schemas parameter is vulnerable to SQL injection, enabling attackers to manipulate SELECT queries that are constructed and executed against the internal MySQL database. This vulnerability allows users with developer permissions to extract data from Looker's internal MySQL database. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect against this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.106 * 24.18.198+ * 25.0.75 * 25.6.63+ * 25.8.45+ * 25.10.33+ * 25.12.1+ * 25.14+

PUBLISHED Reserved 2025-11-05 | Published 2025-11-19 | Updated 2025-11-19 | Assigner GoogleCloud




MEDIUM: 6.0CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/U:Red

Problem types

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

Default status
unaffected

Any version before 24.12.106
affected

Any version before 24.18.198
affected

Any version before 25.0.75
affected

Any version before 25.6.63
affected

Any version before 25.8.45
affected

Any version before 25.10.33
affected

Any version before 25.12.1
affected

Any version before 25.14
affected

Default status
unaffected

Any version before 24.12.106
affected

Any version before 24.18.198
affected

Any version before 25.0.75
affected

Any version before 25.6.63
affected

Any version before 25.8.45
affected

Any version before 25.10.33
affected

Any version before 25.12.1
affected

Any version before 25.14
affected

Credits

Liv Matan from Tenable finder

Tomas Lažauninkas finder

References

cloud.google.com/support/bulletins

www.tenable.com/security/research/tra-2025-43

cve.org (CVE-2025-12743)

nvd.nist.gov (CVE-2025-12743)

Download JSON