A Looker user with Developer role could create a database connection using Denodo driver and, by manipulating LookML, cause Looker to execute a malicious command.
Looker-hosted and Self-hosted were found to be vulnerable.
This issue has already been mitigated for Looker-hosted instances. No user action is required for these.
Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted.
The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ :
* 24.12.108+
* 24.18.200+
* 25.0.78+
* 25.6.65+
* 25.8.47+
* 25.12.10+
* 25.14+
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://cloud.google.com/support/bulletins#gcp-2025-052 |
|
History
Mon, 24 Nov 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 24 Nov 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Looker user with Developer role could create a database connection using Denodo driver and, by manipulating LookML, cause Looker to execute a malicious command. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.108+ * 24.18.200+ * 25.0.78+ * 25.6.65+ * 25.8.47+ * 25.12.10+ * 25.14+ | |
| Title | Arbitrary File Write in Denodo dialect of Looker allows Remote Code Execution | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GoogleCloud
Published: 2025-11-24T11:35:33.730Z
Updated: 2025-11-24T13:13:17.641Z
Reserved: 2025-11-05T10:50:34.070Z
Link: CVE-2025-12741
Updated: 2025-11-24T13:12:44.022Z
Status : Received
Published: 2025-11-24T12:15:45.957
Modified: 2025-11-24T12:15:45.957
Link: CVE-2025-12741
No data.