Looker vulnerability 2025-04-17

Published: 2025-04-17

Description

Description Severity Notes

A vulnerability in Looker allowed users with admin permissions (specifically: manage_project_connections_restricted) in Looker to read files from the underlying host filesystem and query internal network endpoints. This issue is now resolved, and no user action is required for Looker-hosted customers using Looker (Google Cloud core) and Looker (original). Self-hosted Looker instances are advised to update to the latest supported version.

This vulnerability has been patched in all supported versions of customer-hosted Looker, which are available on the Looker download page.

What should I do?

  • For all Looker-hosted instances, including both Looker (Google Cloud core) and Looker (original) instances, there are no actions you need to take.
  • For Looker customer-hosted instances, please update to the latest supported version of Looker as soon as possible. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page:
    • 25.4 -> 25.4.29+
    • 25.2 -> 25.2.34+
    • 25.0 -> 25.0.55+
    • 24.18 -> 24.18.185+
    • 24.12 -> 24.12.95+
    • 24.6 -> 24.6.107+
High