New “LeakyLooker” Vulnerabilities in Google Looker Studio May Allow Cross Tenant SQL Queries

Looker Studio

Cybersecurity researchers have uncovered a group of security vulnerabilities in Google Looker Studio that could have enabled attackers to run unauthorized SQL queries against victims’ databases and extract sensitive information across different organizations.

The flaws, collectively named LeakyLooker, were identified by researchers from Tenable. The vulnerabilities could have exposed data across multiple environments within Google Cloud infrastructures.

Google has confirmed that the issues were fixed after the researchers responsibly disclosed them in June 2025. At present, there is no evidence that these vulnerabilities were exploited in real world attacks.

Nine Security Vulnerabilities Identified

Researchers documented nine distinct vulnerabilities associated with Looker Studio’s handling of cross tenant access and data connectors. These include:

These vulnerabilities could have allowed attackers to manipulate queries, extract sensitive records, and potentially modify stored information within affected databases.

Potential Impact Across Google Cloud Services

According to security researcher Liv Matan, the weaknesses disrupted several core security assumptions in the platform.

Organizations using Looker Studio connectors to services such as:

  • Google Sheets
  • BigQuery
  • Cloud Spanner
  • PostgreSQL
  • MySQL
  • Google Cloud Storage

could have been exposed to cross tenant data access if the vulnerabilities were successfully exploited.

In such a scenario, attackers might gain access to datasets belonging to different organizations hosted within the same cloud environment.

Attack Scenario Involving Public Reports

One possible attack method involves locating publicly available Looker Studio reports that rely on database connectors such as BigQuery.

By abusing the vulnerabilities, attackers could gain control over the underlying database connection and execute arbitrary SQL commands across the entire Google Cloud project associated with the report.

Credential Retention in Cloned Reports

Another attack path relates to a logic flaw within the report cloning feature.

If a victim creates a report using a JDBC data connector such as PostgreSQL and shares it publicly or with a specific user, attackers could duplicate the report while retaining the original owner’s database credentials.

This would allow malicious actors to perform actions such as:

  • deleting tables
  • modifying records
  • executing custom SQL queries

within the victim’s database environment.

One Click Data Exfiltration Technique

Researchers also described a high impact attack scenario involving one click data exfiltration.

In this method, attackers distribute a specially crafted Looker Studio report. When a victim opens the report, malicious code executes within the browser and communicates with an attacker controlled project.

The technique allows attackers to reconstruct entire datasets using query logs and other extracted information.

Violation of Looker Studio’s Security Model

According to the research findings, these vulnerabilities undermined a key security principle of Looker Studio.

Normally, users with viewer permissions should only be able to view data without altering or controlling it. However, the LeakyLooker flaws could have enabled viewers to manipulate queries and retrieve unauthorized data from services like BigQuery and Google Sheets.





Found this article interesting? Follow us on  X (Twitter) FacebookBlue sky and LinkedIn to read more exclusive content we post.