A Looker user with a Developer role could create a database connection using IBM DB2 driver and, by manipulating LookML, cause Looker to execute a malicious command, due to inadequate filtering of the driver's parameters.
Looker-hosted and Self-hosted were found to be vulnerable.
This issue has already been mitigated for Looker-hosted instances. No user action is required for these.
Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted.
The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ :
* 25.0.93+
* 25.6.84+
* 25.12.42+
* 25.14.50+
* 25.16.44+
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://cloud.google.com/support/bulletins#gcp-2025-052 |
|
History
Mon, 24 Nov 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 24 Nov 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Looker user with a Developer role could create a database connection using IBM DB2 driver and, by manipulating LookML, cause Looker to execute a malicious command, due to inadequate filtering of the driver's parameters. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 25.0.93+ * 25.6.84+ * 25.12.42+ * 25.14.50+ * 25.16.44+ | |
| Title | Remote Command Execution in Looker via IBM DB2 JDBC drive | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GoogleCloud
Published: 2025-11-24T11:30:31.958Z
Updated: 2025-11-24T13:14:36.770Z
Reserved: 2025-11-05T10:44:47.390Z
Link: CVE-2025-12740
Updated: 2025-11-24T13:13:51.518Z
Status : Received
Published: 2025-11-24T12:15:45.127
Modified: 2025-11-24T12:15:45.127
Link: CVE-2025-12740
No data.