Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Google fixes issue with CVSS 10 Gemini CLI CI RCE and cursor flaw that could allow code execution

U.S.-Europe fusion agreement extends Wendelstein 7-X research for another 10 years

Source: Anthropic could raise new $50 billion round at $900 billion valuation

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New ‘LeakyLooker’ flaw in Google Looker Studio could allow cross-tenant SQL queries
Identity

New ‘LeakyLooker’ flaw in Google Looker Studio could allow cross-tenant SQL queries

By March 10, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 10, 2026Database security/vulnerabilities

Cybersecurity researchers have revealed nine cross-tenant vulnerabilities in Google Looker Studio. This vulnerability could allow an attacker to execute arbitrary SQL queries against a victim’s database, potentially exposing sensitive data within an organization’s Google Cloud environment.

Tenable collectively refers to these shortcomings as LeakyLooker. There is no evidence that this vulnerability has been exploited in the wild. After responsible disclosure in June 2025, Google addressed the issue.

Here is a list of security flaws:

“This vulnerability violates fundamental design assumptions and exposes a new class of attacks that could allow an attacker to exfiltrate, insert, or delete data on a victim’s services or Google Cloud environment,” security researcher Liv Matan said in a report shared with Hacker News.

“These vulnerabilities could potentially expose sensitive data across Google Cloud Platform (GCP) environments, impacting organizations using Google Sheets, BigQuery, Spanner, PostgreSQL, MySQL, Cloud Storage, and nearly all other Looker Studio data connectors.”

Successful exploitation of cross-tenant flaws could allow threat actors to access datasets and projects across different cloud tenants.

An attacker could scan Looker Studio’s public reports or gain access to private reports that use these connectors (such as BigQuery) to gain control of the database and allow them to run arbitrary SQL queries across the owner’s GCP projects.

Alternatively, the victim creates the report as public or shares it with specific recipients and uses a JDBC-connected data source such as PostgreSQL. In this scenario, an attacker could exploit a logical flaw in the report copy functionality to create a duplicate report while retaining the original owner’s credentials, allowing them to delete or modify the table.

Another high-impact vector detailed by the cybersecurity firm involves one-click data exfiltration, where sharing a specially crafted report executes malicious code in a victim’s browser, accessing attacker-controlled projects and rebuilding entire databases from logs.

“This vulnerability breaks the fundamental promise that ‘viewers’ can never control the data they are viewing,” Matan said, adding that “an attacker could potentially leak or modify data across Google services, including BigQuery and Google Sheets.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe SpaceX veteran says the next big thing in space is a satellite returning to Earth.
Next Article Fallen meteorite punches a hole in the roof of a German house after a spectacular ‘fireball’ explosion over Europe

Related Posts

Google fixes issue with CVSS 10 Gemini CLI CI RCE and cursor flaw that could allow code execution

April 30, 2026

SAP-related npm packages compromised in supply chain attack that steals credentials

April 29, 2026

New wave of North Korean attacks using AI-embedded npm malware, fake companies, and RATs

April 29, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Google fixes issue with CVSS 10 Gemini CLI CI RCE and cursor flaw that could allow code execution

U.S.-Europe fusion agreement extends Wendelstein 7-X research for another 10 years

Source: Anthropic could raise new $50 billion round at $900 billion valuation

Elon Musk can’t escape his own tweets on stage

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.