An attacker with a Looker Developer role could manipulate...
High severity
Unreviewed
Published
Nov 19, 2025
to the GitHub Advisory Database
•
Updated Nov 19, 2025
Description
Published by the National Vulnerability Database
Nov 19, 2025
Published to the GitHub Advisory Database
Nov 19, 2025
Last updated
Nov 19, 2025
An attacker with a Looker Developer role could manipulate a LookML project to exploit a race condition during Git directory deletion, leading to arbitrary command execution on the Looker instance.
Looker-hosted and Self-hosted were found to be vulnerable.
This issue has already been mitigated for Looker-hosted instances. No user action is required for these.
Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted.
The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ :
References