CVE-2025-12743 (GCVE-0-2025-12743)

Vulnerability from cvelistv5 – Published: 2025-11-19 16:41 – Updated: 2025-11-19 18:47
VLAI?
Summary
The Looker endpoint for generating new projects from database connections allows users to specify "looker" as a connection name, which is a reserved internal name for Looker's internal MySQL database. The schemas parameter is vulnerable to SQL injection, enabling attackers to manipulate SELECT queries that are constructed and executed against the internal MySQL database. This vulnerability allows users with developer permissions to extract data from Looker's internal MySQL database. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect against this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.106 * 24.18.198+ * 25.0.75 * 25.6.63+ * 25.8.45+ * 25.10.33+ * 25.12.1+ * 25.14+
CWE
  • CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Assigner
Impacted products
Vendor Product Version
Google Cloud Looker Affected: 0 , < 24.12.106 (date)
Affected: 0 , < 24.18.198 (date)
Affected: 0 , < 25.0.75 (date)
Affected: 0 , < 25.6.63 (date)
Affected: 0 , < 25.8.45 (date)
Affected: 0 , < 25.10.33 (date)
Affected: 0 , < 25.12.1 (date)
Affected: 0 , < 25.14 (date)
Create a notification for this product.
    Google Cloud Looker Affected: 0 , < 24.12.106 (date)
Affected: 0 , < 24.18.198 (date)
Affected: 0 , < 25.0.75 (date)
Affected: 0 , < 25.6.63 (date)
Affected: 0 , < 25.8.45 (date)
Affected: 0 , < 25.10.33 (date)
Affected: 0 , < 25.12.1 (date)
Affected: 0 , < 25.14 (date)
Create a notification for this product.
Credits
Liv Matan from Tenable Tomas Lažauninkas
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-12743",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-19T18:47:06.246892Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-19T18:47:37.355Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Looker-hosted"
          ],
          "product": "Looker",
          "vendor": "Google Cloud",
          "versions": [
            {
              "lessThan": "24.12.106",
              "status": "affected",
              "version": "0",
              "versionType": "date"
            },
            {
              "lessThan": "24.18.198",
              "status": "affected",
              "version": "0",
              "versionType": "date"
            },
            {
              "lessThan": "25.0.75",
              "status": "affected",
              "version": "0",
              "versionType": "date"
            },
            {
              "lessThan": "25.6.63",
              "status": "affected",
              "version": "0",
              "versionType": "date"
            },
            {
              "lessThan": "25.8.45",
              "status": "affected",
              "version": "0",
              "versionType": "date"
            },
            {
              "lessThan": "25.10.33",
              "status": "affected",
              "version": "0",
              "versionType": "date"
            },
            {
              "lessThan": "25.12.1",
              "status": "affected",
              "version": "0",
              "versionType": "date"
            },
            {
              "lessThan": "25.14",
              "status": "affected",
              "version": "0",
              "versionType": "date"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Self-hosted"
          ],
          "product": "Looker",
          "vendor": "Google Cloud",
          "versions": [
            {
              "lessThan": "24.12.106",
              "status": "affected",
              "version": "0",
              "versionType": "date"
            },
            {
              "lessThan": "24.18.198",
              "status": "affected",
              "version": "0",
              "versionType": "date"
            },
            {
              "lessThan": "25.0.75",
              "status": "affected",
              "version": "0",
              "versionType": "date"
            },
            {
              "lessThan": "25.6.63",
              "status": "affected",
              "version": "0",
              "versionType": "date"
            },
            {
              "lessThan": "25.8.45",
              "status": "affected",
              "version": "0",
              "versionType": "date"
            },
            {
              "lessThan": "25.10.33",
              "status": "affected",
              "version": "0",
              "versionType": "date"
            },
            {
              "lessThan": "25.12.1",
              "status": "affected",
              "version": "0",
              "versionType": "date"
            },
            {
              "lessThan": "25.14",
              "status": "affected",
              "version": "0",
              "versionType": "date"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Liv Matan from Tenable"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Tomas La\u017eauninkas"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Looker endpoint for generating new projects from database connections allows users to specify \"looker\" as a connection name, which is a reserved internal name for Looker\u0027s internal MySQL database. The schemas parameter is vulnerable to SQL injection, enabling attackers to manipulate SELECT queries that are constructed and executed against the internal MySQL database. This vulnerability allows users with developer permissions to extract data from Looker\u0027s internal MySQL database.\u003cbr\u003e\u003cbr\u003eLooker-hosted and Self-hosted were found to be vulnerable.\u003cbr\u003eThis issue has already been mitigated for Looker-hosted instances.\u0026nbsp;No user action is required for these.\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003eSelf-hosted instances must be upgraded \u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003eas soon as possible\u003c/span\u003e. This vulnerability has been patched in all supported versions of Self-hosted.\u003c/span\u003e\u003cbr\u003e\u003cdiv\u003e\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003eThe versions below have all been updated to protect against this vulnerability. You can download these versions at the Looker download page \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://download.looker.com/\"\u003ehttps://download.looker.com/\u003c/a\u003e\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003e:\u003cbr\u003e\u003cul\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003e24.12.106\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003e24.18.198+\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003e25.0.75\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003e25.6.63+\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003e25.8.45+\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003e25.10.33+\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003e25.12.1+\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003e25.14+\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/div\u003e"
            }
          ],
          "value": "The Looker endpoint for generating new projects from database connections allows users to specify \"looker\" as a connection name, which is a reserved internal name for Looker\u0027s internal MySQL database. The schemas parameter is vulnerable to SQL injection, enabling attackers to manipulate SELECT queries that are constructed and executed against the internal MySQL database. This vulnerability allows users with developer permissions to extract data from Looker\u0027s internal MySQL database.\n\nLooker-hosted and Self-hosted were found to be vulnerable.\nThis issue has already been mitigated for Looker-hosted instances.\u00a0No user action is required for these.\n\n\nSelf-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted.\nThe versions below have all been updated to protect against this vulnerability. You can download these versions at the Looker download page  https://download.looker.com/ :\n  *  24.12.106\n  *  24.18.198+\n  *  25.0.75\n  *  25.6.63+\n  *  25.8.45+\n  *  25.10.33+\n  *  25.12.1+\n  *  25.14+"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-66",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-66 SQL Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "PRESENT",
            "attackVector": "NETWORK",
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "LOW",
            "providerUrgency": "RED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/U:Red",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-89",
              "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-19T16:41:30.639Z",
        "orgId": "f45cbf4e-4146-4068-b7e1-655ffc2c548c",
        "shortName": "GoogleCloud"
      },
      "references": [
        {
          "url": "https://cloud.google.com/support/bulletins#gcp-2025-052"
        },
        {
          "url": "https://www.tenable.com/security/research/tra-2025-43"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "SQL Injection in Looker Project Generation Endpoint Allows Access to Internal MySQL Database",
      "x_generator": {
        "engine": "Vulnogram 0.4.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f45cbf4e-4146-4068-b7e1-655ffc2c548c",
    "assignerShortName": "GoogleCloud",
    "cveId": "CVE-2025-12743",
    "datePublished": "2025-11-19T16:41:30.639Z",
    "dateReserved": "2025-11-05T10:51:12.658Z",
    "dateUpdated": "2025-11-19T18:47:37.355Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-12743\",\"sourceIdentifier\":\"f45cbf4e-4146-4068-b7e1-655ffc2c548c\",\"published\":\"2025-11-19T17:15:46.003\",\"lastModified\":\"2025-11-19T19:14:59.327\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Looker endpoint for generating new projects from database connections allows users to specify \\\"looker\\\" as a connection name, which is a reserved internal name for Looker\u0027s internal MySQL database. The schemas parameter is vulnerable to SQL injection, enabling attackers to manipulate SELECT queries that are constructed and executed against the internal MySQL database. This vulnerability allows users with developer permissions to extract data from Looker\u0027s internal MySQL database.\\n\\nLooker-hosted and Self-hosted were found to be vulnerable.\\nThis issue has already been mitigated for Looker-hosted instances.\u00a0No user action is required for these.\\n\\n\\nSelf-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted.\\nThe versions below have all been updated to protect against this vulnerability. You can download these versions at the Looker download page  https://download.looker.com/ :\\n  *  24.12.106\\n  *  24.18.198+\\n  *  25.0.75\\n  *  25.6.63+\\n  *  25.8.45+\\n  *  25.10.33+\\n  *  25.12.1+\\n  *  25.14+\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"f45cbf4e-4146-4068-b7e1-655ffc2c548c\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Red\",\"baseScore\":6.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"RED\"}}]},\"weaknesses\":[{\"source\":\"f45cbf4e-4146-4068-b7e1-655ffc2c548c\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-89\"}]}],\"references\":[{\"url\":\"https://cloud.google.com/support/bulletins#gcp-2025-052\",\"source\":\"f45cbf4e-4146-4068-b7e1-655ffc2c548c\"},{\"url\":\"https://www.tenable.com/security/research/tra-2025-43\",\"source\":\"f45cbf4e-4146-4068-b7e1-655ffc2c548c\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-12743\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-11-19T18:47:06.246892Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-11-19T18:47:28.552Z\"}}], \"cna\": {\"title\": \"SQL Injection in Looker Project Generation Endpoint Allows Access to Internal MySQL Database\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Liv Matan from Tenable\"}, {\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Tomas La\\u017eauninkas\"}], \"impacts\": [{\"capecId\": \"CAPEC-66\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-66 SQL Injection\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 6, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/U:Red\", \"exploitMaturity\": \"NOT_DEFINED\", \"providerUrgency\": \"RED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"LOW\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Google Cloud\", \"product\": \"Looker\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"24.12.106\", \"versionType\": \"date\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"24.18.198\", \"versionType\": \"date\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"25.0.75\", \"versionType\": \"date\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"25.6.63\", \"versionType\": \"date\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"25.8.45\", \"versionType\": \"date\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"25.10.33\", \"versionType\": \"date\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"25.12.1\", \"versionType\": \"date\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"25.14\", \"versionType\": \"date\"}], \"platforms\": [\"Looker-hosted\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Google Cloud\", \"product\": \"Looker\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"24.12.106\", \"versionType\": \"date\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"24.18.198\", \"versionType\": \"date\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"25.0.75\", \"versionType\": \"date\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"25.6.63\", \"versionType\": \"date\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"25.8.45\", \"versionType\": \"date\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"25.10.33\", \"versionType\": \"date\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"25.12.1\", \"versionType\": \"date\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"25.14\", \"versionType\": \"date\"}], \"platforms\": [\"Self-hosted\"], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://cloud.google.com/support/bulletins#gcp-2025-052\"}, {\"url\": \"https://www.tenable.com/security/research/tra-2025-43\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.4.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"The Looker endpoint for generating new projects from database connections allows users to specify \\\"looker\\\" as a connection name, which is a reserved internal name for Looker\u0027s internal MySQL database. The schemas parameter is vulnerable to SQL injection, enabling attackers to manipulate SELECT queries that are constructed and executed against the internal MySQL database. This vulnerability allows users with developer permissions to extract data from Looker\u0027s internal MySQL database.\\n\\nLooker-hosted and Self-hosted were found to be vulnerable.\\nThis issue has already been mitigated for Looker-hosted instances.\\u00a0No user action is required for these.\\n\\n\\nSelf-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted.\\nThe versions below have all been updated to protect against this vulnerability. You can download these versions at the Looker download page  https://download.looker.com/ :\\n  *  24.12.106\\n  *  24.18.198+\\n  *  25.0.75\\n  *  25.6.63+\\n  *  25.8.45+\\n  *  25.10.33+\\n  *  25.12.1+\\n  *  25.14+\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"The Looker endpoint for generating new projects from database connections allows users to specify \\\"looker\\\" as a connection name, which is a reserved internal name for Looker\u0027s internal MySQL database. The schemas parameter is vulnerable to SQL injection, enabling attackers to manipulate SELECT queries that are constructed and executed against the internal MySQL database. This vulnerability allows users with developer permissions to extract data from Looker\u0027s internal MySQL database.\u003cbr\u003e\u003cbr\u003eLooker-hosted and Self-hosted were found to be vulnerable.\u003cbr\u003eThis issue has already been mitigated for Looker-hosted instances.\u0026nbsp;No user action is required for these.\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\u003cspan style=\\\"background-color: rgb(252, 252, 252);\\\"\u003eSelf-hosted instances must be upgraded \u003cspan style=\\\"background-color: rgb(252, 252, 252);\\\"\u003eas soon as possible\u003c/span\u003e. This vulnerability has been patched in all supported versions of Self-hosted.\u003c/span\u003e\u003cbr\u003e\u003cdiv\u003e\u003cspan style=\\\"background-color: rgb(252, 252, 252);\\\"\u003eThe versions below have all been updated to protect against this vulnerability. You can download these versions at the Looker download page \u003c/span\u003e\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://download.looker.com/\\\"\u003ehttps://download.looker.com/\u003c/a\u003e\u003cspan style=\\\"background-color: rgb(252, 252, 252);\\\"\u003e:\u003cbr\u003e\u003cul\u003e\u003cli\u003e\u003cspan style=\\\"background-color: rgb(252, 252, 252);\\\"\u003e24.12.106\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\\\"background-color: rgb(252, 252, 252);\\\"\u003e24.18.198+\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\\\"background-color: rgb(252, 252, 252);\\\"\u003e25.0.75\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\\\"background-color: rgb(252, 252, 252);\\\"\u003e25.6.63+\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\\\"background-color: rgb(252, 252, 252);\\\"\u003e25.8.45+\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\\\"background-color: rgb(252, 252, 252);\\\"\u003e25.10.33+\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\\\"background-color: rgb(252, 252, 252);\\\"\u003e25.12.1+\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\\\"background-color: rgb(252, 252, 252);\\\"\u003e25.14+\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/div\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-89\", \"description\": \"CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"f45cbf4e-4146-4068-b7e1-655ffc2c548c\", \"shortName\": \"GoogleCloud\", \"dateUpdated\": \"2025-11-19T16:41:30.639Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-12743\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-19T18:47:37.355Z\", \"dateReserved\": \"2025-11-05T10:51:12.658Z\", \"assignerOrgId\": \"f45cbf4e-4146-4068-b7e1-655ffc2c548c\", \"datePublished\": \"2025-11-19T16:41:30.639Z\", \"assignerShortName\": \"GoogleCloud\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…