ANAVEM
Languagefr
Modern server room with glowing blue servers and network infrastructure

Google Patches Nine Looker Studio Cross-Tenant Flaws

Tenable researchers discovered nine cross-tenant vulnerabilities in Google Looker Studio that could enable SQL injection attacks against cloud databases.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
10 March 2026, 14:20 4 min read 0

Last updated 17 March 2026, 03:00

SEVERITYHigh
PATCH STATUSAvailable
VENDORGoogle
AFFECTEDGoogle Looker Studio, Google C...
CATEGORYVulnerabilities

Key Takeaways

Tenable Uncovers LeakyLooker Vulnerability Chain in Google's Business Intelligence Platform

Security researchers at Tenable disclosed nine critical cross-tenant vulnerabilities in Google Looker Studio on March 10, 2026, collectively dubbed LeakyLooker. The vulnerability chain could have allowed attackers to execute arbitrary SQL queries against victims' databases and steal sensitive information from Google Cloud environments across organizational boundaries.

The research team discovered these flaws during a comprehensive security assessment of Google's business intelligence platform, which serves millions of users worldwide for data visualization and reporting. Looker Studio, formerly known as Google Data Studio, integrates deeply with Google Cloud services and connects to various database systems including BigQuery, Cloud SQL, and external data sources.

The vulnerabilities exploited weaknesses in Looker Studio's tenant isolation mechanisms, which are designed to prevent one organization's data from being accessed by another. According to Tenable's findings, the flaws could be chained together to bypass these security controls and gain unauthorized access to databases belonging to other Google Cloud customers.

The attack vector involved manipulating Looker Studio's data source configuration and query processing mechanisms. Researchers demonstrated how an attacker could craft malicious data source connections that would execute SQL commands against databases they shouldn't have access to. The cross-tenant nature of these vulnerabilities made them particularly dangerous, as they could potentially affect any organization using Looker Studio with cloud-based data sources.

Related: CISA Adds Hikvision, Rockwell Flaws to KEV Catalog

Related: China's CNCERT Warns of OpenClaw AI Agent Security Flaws

Related: HPE Patches Five Critical AOS-CX Flaws: RCE, Privilege

Related: Veeam Patches Four Critical RCE Flaws in Backup Software

Related: Google Patches Two Chrome Zero-Days Under Active Attack

Google's security team worked closely with Tenable researchers following responsible disclosure protocols. The vulnerabilities were reported through Google's Vulnerability Reward Program, and patches were developed and deployed across Google's infrastructure. The company confirmed that all nine vulnerabilities have been addressed and that no customer data was compromised during the research or remediation process.

Google Cloud Customers Using Looker Studio Face Cross-Tenant Exposure Risk

The LeakyLooker vulnerabilities affected all Google Looker Studio users who connected the platform to cloud-based databases, particularly those using Google Cloud services like BigQuery and Cloud SQL. Organizations across all industries that relied on Looker Studio for business intelligence and data visualization were potentially at risk, including enterprises, government agencies, healthcare providers, and financial institutions.

The cross-tenant nature of these vulnerabilities meant that any organization sharing Google's multi-tenant cloud infrastructure could have been targeted. This included both small businesses using basic Looker Studio features and large enterprises with complex data architectures spanning multiple Google Cloud projects and regions. The risk was particularly elevated for organizations that granted broad database permissions to their Looker Studio service accounts.

Google Cloud customers using on-premises databases or third-party cloud providers connected through Looker Studio were also within the scope of potential impact. The vulnerabilities could have been exploited to access any database system that Looker Studio had been granted connection privileges to, regardless of where the database was hosted. This broad attack surface made the vulnerability chain particularly concerning for organizations with hybrid or multi-cloud architectures.

Google Deploys Comprehensive Patches Across Looker Studio Infrastructure

Google has implemented comprehensive security patches across its Looker Studio infrastructure to address all nine LeakyLooker vulnerabilities. The fixes involved strengthening tenant isolation controls, implementing additional input validation for data source configurations, and enhancing query execution sandboxing mechanisms. These changes were deployed automatically across Google's global infrastructure without requiring any action from customers.

Organizations using Looker Studio should review their data source configurations and access permissions as a precautionary measure. Google recommends following the principle of least privilege when granting database access to Looker Studio service accounts. Administrators should audit existing data source connections and ensure that service accounts have only the minimum permissions necessary for their intended functions.

For enhanced security monitoring, organizations should enable Google Cloud audit logging for their Looker Studio instances and review logs for any suspicious query patterns or unauthorized data access attempts. CISA's Known Exploited Vulnerabilities catalog provides additional guidance on monitoring for signs of exploitation in cloud environments. Google has also published updated security best practices for Looker Studio deployments in their official documentation.

The company has confirmed that all patches are now active and that the vulnerabilities can no longer be exploited. Google's security team continues to monitor for any potential exploitation attempts and has implemented additional detection mechanisms to identify similar vulnerability patterns in the future. Organizations concerned about potential exposure can contact Google Cloud Support for additional security assessments of their Looker Studio deployments.

Frequently Asked Questions

What are the LeakyLooker vulnerabilities in Google Looker Studio?+
LeakyLooker refers to nine cross-tenant vulnerabilities discovered by Tenable researchers that could allow attackers to execute arbitrary SQL queries against victims' databases. The flaws bypassed tenant isolation controls in Google Looker Studio.
Are the Google Looker Studio vulnerabilities patched?+
Yes, Google has patched all nine LeakyLooker vulnerabilities across their infrastructure. The fixes were deployed automatically without requiring customer action and strengthen tenant isolation controls.
Were the Looker Studio vulnerabilities exploited in attacks?+
No, there is no evidence that the LeakyLooker vulnerabilities were exploited in the wild. Google confirmed no customer data was compromised during the research or remediation process.
Emanuel DE ALMEIDA
About the Author

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...