Researchers Disclose Nine Cross-Tenant Vulnerabilities in Google Looker Studio
Cybersecurity researchers disclose nine cross-tenant vulnerabilities in Google Looker Studio that could have allowed attackers to run arbitrary SQL queries on other organizations' databases and exfiltrate sensitive data within Google Cloud environments.
Cybersecurity researchers have disclosed nine cross-tenant vulnerabilities in Google Looker Studio, the business intelligence and data visualization platform within Google Cloud, that could have allowed attackers to run arbitrary SQL queries on other organizations' databases and exfiltrate sensitive data.
The Vulnerabilities
The nine flaws collectively enabled a cross-tenant attack chain where an attacker with access to one Google Cloud organization could pivot to access data belonging to other organizations sharing the same Looker Studio infrastructure. The vulnerabilities included insufficient input validation in data source connectors, authorization bypass in shared dashboard links, and server-side request forgery (SSRF) flaws that could be chained to access internal Google Cloud APIs that should not have been reachable from Looker Studio.
Impact Assessment
In the worst-case scenario, an attacker could use the vulnerability chain to execute arbitrary SQL queries against databases connected to a victim organization's Looker Studio instance — potentially exfiltrating customer data, financial records, or other sensitive information stored in Cloud SQL, BigQuery, or external databases connected through Looker's data source integrations. Google confirmed that it found no evidence of exploitation in the wild before the vulnerabilities were patched.
Remediation
Google patched all nine vulnerabilities through server-side updates that required no customer action. The company awarded bug bounties to the researchers who discovered the flaws and updated its security review processes for Looker Studio's data source connector framework. The disclosure highlights the security risks inherent in multi-tenant SaaS platforms that provide database connectivity — each data source connection creates a potential path from the shared platform to a customer's sensitive data stores.
Related Articles
Cloudflare 2026 Threat Report: 230 Billion Daily Blocked Threats and the Rise of Credential Attacks
Cloudflare has published its inaugural annual threat report revealing the company blocks over 230 billion threats daily across 20% of global web traffic. DDoS attacks doubled year-over-year to 47.1 million incidents, with the largest reaching a record 31.4 Tbps, while bots now account for 94% of all login attempts.
HashiCorp Patches Consul Arbitrary File Read Vulnerability in Kubernetes Auth
HashiCorp has released emergency patches for Consul to address CVE-2026-2808, a medium-severity vulnerability allowing arbitrary file reads when Kubernetes authentication is enabled. The fix also adds HTTP server timeouts to prevent Slowloris denial-of-service attacks against Consul agent endpoints.
Let's Encrypt Now Issues Six-Day Certificates and IP Address Certificates via Certbot
Let's Encrypt and the EFF have announced support for six-day (160-hour) certificates and IP address certificates through Certbot 5.3 and 5.4. The ultra-short-lived certificates reduce the impact window of compromised keys by design, while IP address certificates enable HTTPS for services identified by address rather than hostname.