CVE-2025-12472

HIGH

Looker <upgrade - RCE

Title source: llm
STIX 2.1

Description

An attacker with a Looker Developer role could manipulate a LookML project to exploit a race condition during Git directory deletion, leading to arbitrary command execution on the Looker instance. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.103+ * 24.18.195+ * 25.0.72+ * 25.6.60+ * 25.8.42+ * 25.10.22+

Scores

CVSS v4 7.1
EPSS 0.0004
EPSS Percentile 12.9%
CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/U:Red

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-362
Status published
Products (6)
Google Cloud/Looker < 24.12.103
Google Cloud/Looker < 24.18.195
Google Cloud/Looker < 25.0.72
Google Cloud/Looker < 25.10.22
Google Cloud/Looker < 25.6.60
Google Cloud/Looker < 25.8.42
Published Nov 19, 2025
Tracked Since Feb 18, 2026