Description
An attacker could take over a Looker account in a Looker instance configured with OIDC authentication, due to email address string normalization.Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.100+ * 24.18.193+ * 25.0.69+ * 25.6.57+ * 25.8.39+ * 25.10.22+ * 25.12.0+
Scores
CVSS v4
9.2
EPSS
0.0007
EPSS Percentile
21.7%
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/U:Amber
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-290
Status
published
Products (7)
Google Cloud/Looker
< 24.12.100
Google Cloud/Looker
< 24.18.193
Google Cloud/Looker
< 25.0.69
Google Cloud/Looker
< 25.10.22
Google Cloud/Looker
< 25.12.0
Google Cloud/Looker
< 25.6.57
Google Cloud/Looker
< 25.8.39
Published
Nov 20, 2025
Tracked Since
Feb 18, 2026