Command Injection Vulnerability in Looker by Google Cloud
CVE-2025-12155

7.1HIGH

Key Information:

Status
Vendor
CVE Published:
10 November 2025

What is CVE-2025-12155?

A security vulnerability in Looker arises from improper file path sanitization, specifically allowing command injection. This issue permits an attacker with Developer permissions to execute arbitrary shell commands when a deletion operation is performed by a user on the host system. While Looker-hosted instances have been patched, users of Self-hosted versions must upgrade to the latest versions to protect against potential exploitation. The vulnerability is now resolved in all supported Self-hosted releases.

Affected Version(s)

Looker Looker-hosted 0 < 24.12.100

Looker Looker-hosted 0 < 24.18.192

Looker Looker-hosted 0 < 25.0.69

References

CVSS V4

Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Tomas LaĹľauninkas
.
CVE-2025-12155 : Command Injection Vulnerability in Looker by Google Cloud