A Looker user with a Developer role could cause Looker to execute a malicious command, due to insecure processing of Teradata driver parameters.
Looker-hosted and Self-hosted were found to be vulnerable.
This issue has already been mitigated for Looker-hosted instances. No user action is required for these.
Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted.
The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ :
* 24.12.108+
* 24.18.200+
* 25.0.78+
* 25.6.65+
* 25.8.47+
* 25.12.10+
* 25.14+
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://cloud.google.com/support/bulletins#gcp-2025-052 |
|
History
Wed, 26 Nov 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google cloud Looker |
|
| Vendors & Products |
Google
Google cloud Looker |
Tue, 25 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 25 Nov 2025 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Looker user with a Developer role could cause Looker to execute a malicious command, due to insecure processing of Teradata driver parameters. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.108+ * 24.18.200+ * 25.0.78+ * 25.6.65+ * 25.8.47+ * 25.12.10+ * 25.14+ | |
| Title | Remote Code Execution in Looker via Teradata JDBC Driver | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GoogleCloud
Published: 2025-11-25T05:38:47.907Z
Updated: 2025-11-25T14:39:05.212Z
Reserved: 2025-11-05T10:50:53.509Z
Link: CVE-2025-12742
Updated: 2025-11-25T14:38:57.582Z
Status : Awaiting Analysis
Published: 2025-11-25T06:15:45.333
Modified: 2025-11-25T22:16:16.690
Link: CVE-2025-12742
No data.