Description

A Looker user with a Developer role could cause Looker to execute a malicious command, due to insecure processing of Teradata driver parameters. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.108+ * 24.18.200+ * 25.0.78+ * 25.6.65+ * 25.8.47+ * 25.12.10+ * 25.14+

INFO

Published Date :

2025-11-25T05:38:47.907Z

Last Modified :

2025-11-25T14:39:05.212Z

Source :

GoogleCloud
AFFECTED PRODUCTS

The following products are affected by CVE-2025-12742 vulnerability.

Vendors Products
Google
  • Cloud Looker
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-12742.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability