VYPR
High severityNVD Advisory· Published Nov 24, 2025· Updated Apr 15, 2026

CVE-2025-12741

CVE-2025-12741

Description

A Looker user with Developer role could create a database connection using Denodo driver and, by manipulating LookML, cause Looker to execute a malicious command.

Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these.

Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.108+ * 24.18.200+ * 25.0.78+ * 25.6.65+ * 25.8.47+ * 25.12.10+ * 25.14+

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Developer role in Looker can craft a malicious Denodo database connection via LookML, leading to remote command execution.

Vulnerability

Overview A Looker user with the Developer role can exploit a flaw in the Denodo database driver integration. By crafting a specially manipulated LookML model, the attacker can cause Looker to execute arbitrary commands on the underlying server. This stems from insufficient sanitization of inputs passed to the Denodo driver, allowing injection of malicious system commands during connection setup.

Attack

Vector Exploitation requires an authenticated Looker user who holds the Developer role. The attacker creates a new database connection using the Denodo driver, then manipulates LookML parameters to inject arbitrary system commands. No additional privileges or network position beyond access to the Looker instance are needed. Both Looker-hosted and Self-hosted environments are affected [1].

Impact

Successful exploitation enables remote code execution on the server hosting Looker. An attacker could gain full control over the Looker instance, potentially leading to data exfiltration, lateral movement, or further compromise of connected systems. The vulnerability is rated High severity due to the low complexity and high potential impact.

Mitigation

Looker-hosted instances have already been patched automatically, requiring no user action. Self-hosted instances must upgrade to patched versions: 24.12.108+, 24.18.200+, 25.0.78+, 25.6.65+, 25.8.47+, 25.12.10+, and 25.14+. No workaround is available; upgrading is essential to remediate the vulnerability [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.