A Looker user with Developer role could create a database connection using Denodo driver and, by manipulating LookML, cause Looker to execute a malicious command. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.108+ * 24.18.200+ * 25.0.78+ * 25.6.65+ * 25.8.47+ * 25.12.10+ * 25.14+
History

Mon, 24 Nov 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 24 Nov 2025 11:45:00 +0000

Type Values Removed Values Added
Description A Looker user with Developer role could create a database connection using Denodo driver and, by manipulating LookML, cause Looker to execute a malicious command. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.108+ * 24.18.200+ * 25.0.78+ * 25.6.65+ * 25.8.47+ * 25.12.10+ * 25.14+
Title Arbitrary File Write in Denodo dialect of Looker allows Remote Code Execution
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/U:Red'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GoogleCloud

Published: 2025-11-24T11:35:33.730Z

Updated: 2025-11-24T13:13:17.641Z

Reserved: 2025-11-05T10:50:34.070Z

Link: CVE-2025-12741

cve-icon Vulnrichment

Updated: 2025-11-24T13:12:44.022Z

cve-icon NVD

Status : Received

Published: 2025-11-24T12:15:45.957

Modified: 2025-11-24T12:15:45.957

Link: CVE-2025-12741

cve-icon Redhat

No data.