CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

LeakyLooker Vulnerabilities in Google Looker Studio

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Nine cross-tenant vulnerabilities, collectively named LeakyLooker, were discovered in Google Looker Studio. These flaws could allow attackers to execute arbitrary SQL queries on victims' databases and exfiltrate sensitive data within Google Cloud environments. The vulnerabilities were disclosed responsibly and have been addressed by Google. No evidence of exploitation in the wild has been found.

Timeline

  1. 10.03.2026 15:20 1 articles · 22h ago

    LeakyLooker Vulnerabilities Disclosed and Patched

    Nine cross-tenant vulnerabilities in Google Looker Studio, collectively named LeakyLooker, were disclosed in June 2025. These flaws could enable attackers to execute arbitrary SQL queries and exfiltrate sensitive data within Google Cloud environments. The vulnerabilities have been addressed by Google, and there is no evidence of exploitation in the wild.

    Show sources

Information Snippets