• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new "leakylooker" flaws in google looker studio could enable cross tenant

New “LeakyLooker” Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries

You are here: Home / General Cyber Security News / New “LeakyLooker” Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries
March 10, 2026

Cybersecurity researchers have disclosed nine cross-tenant vulnerabilities in Google Looker Studio that could have permitted attackers to run arbitrary SQL queries on victims’ databases and exfiltrate sensitive data within organizations’ Google Cloud environments.

The shortcomings have been collectively named LeakyLooker by Tenable. There is no evidence that the vulnerabilities were exploited in the wild. Following responsible disclosure in June 2025, the issues have been addressed by Google.

The list of security flaws is as follows –

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


  • Cross Tenant Unauthorized Access – Zero-Click SQL Injection on Database Connectors
  • Cross Tenant Unauthorized Access – Zero-Click SQL Injection Through Stored Credentials
  • Cross Tenant SQL Injection on BigQuery Through Native Functions
  • Cross-Tenant Data Sources Leak With Hyperlinks
  • Cross Tenant SQL injection on Spanner and BigQuery Through Custom Queries on a Victim’s Data Source
  • Cross Tenant SQL Injection on BigQuery and Spanner Through the Linking API
  • Cross-Tenant Data Sources Leak With Image Rendering
  • Cross-Tenant XS Leak on Arbitrary Data Sources With Frame Counting and Timing Oracles
  • Cross Tenant Denial of Wallet Through BigQuery

Cybersecurity

“The vulnerabilities broke fundamental design assumptions, revealed a new attack class, and could have allowed attackers to exfiltrate, insert, and delete data in victims’ services and Google Cloud environment,” security researcher Liv Matan said in a report shared with The Hacker News.

“These vulnerabilities exposed sensitive data across Google Cloud Platform (GCP) environments, potentially affecting any organization using Google Sheets, BigQuery, Spanner, PostgreSQL, MySQL, Cloud Storage, and almost any other Looker Studio data connector.”

Successful exploitation of the cross-tenant flaws could enable threat actors to gain access to entire datasets and projects across different cloud tenants.

Attackers could scan for public Looker Studio reports or obtain access to private ones that use these connectors (e.g., BigQuery) and seize control of the databases, allowing them to run arbitrary SQL queries across the owner’s entire GCP project.

Alternatively, a victim creates a report as public or shares it with a specific recipient, and uses a JDBC-connected data source such as PostgreSQL. In this scenario, the attacker can take advantage of a logic flaw in the copy report feature that makes it possible to clone reports while retaining the original owner’s credentials, enabling them to delete or modify tables.

Another high-impact path detailed by the cybersecurity company involved one-click data exfiltration, where sharing a specially crafted report forces a victim’s browser to execute malicious code that contacts an attacker-controlled project to reconstruct entire databases from logs.

“The vulnerabilities broke the fundamental promise that a ‘Viewer’ should never be able to control the data they are viewing,” Matan said, adding they “could have let attackers exfiltrate or modify data across Google services like BigQuery and Google Sheets.”

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «how to stop ai data leaks: a webinar guide to How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New “LeakyLooker” Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries
  • How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows
  • The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction
  • APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military
  • Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool
  • CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited
  • Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials
  • UNC4899 Used AirDrop File Transfer and Cloud Exploits to Steal Millions From Crypto Firm Mar 09, 2026 DevOps / Threat Intelligence The North Korean threat actor known as UNC4899 is suspected to be behind a sophisticated cloud compromise campaign targeting a cryptocurrency organization in 2025 to steal millions of dollars in cryptocurrency. The activity has been attributed with moderate confidence to the state-sponsored adversary, which is also tracked under the cryptonyms Jade Sleet, PUKCHONG, Slow Pisces, and TraderTraitor.  "This incident is notable for its blend of social engineering, exploitation of personal-to-corporate device peer-to-peer data (P2P) transfer mechanisms, workflows, and eventual pivot to the cloud to employ living-off-the-cloud (LOTC) techniques," the tech giant noted in its H1 2026 Cloud Threat Horizons Report [PDF] shared with The Hacker News. Upon gaining access to the cloud environment, the attackers are said to have abused legitimate DevOps workflows to harvest credentials, break out of the confines of containers, and tamper with Cloud SQL databases to facilitate the cr…
  • ⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware
  • Can the Security Platform Finally Deliver for the Mid-Market?

Copyright © TheCyberSecurity.News, All Rights Reserved.