Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Apache bRPC Vulnerability Enables Remote Command Injection

Apache bRPC Vulnerability Enables Remote Command Injection

Posted on January 20, 2026January 20, 2026 By CWS

A crucial distant command-injection vulnerability has been found in Apache bRPC’s built-in heap profiler service, affecting all variations earlier than 1.15.0 throughout all platforms.

The vulnerability permits unauthenticated attackers to execute arbitrary system instructions by manipulating the profiler’s parameter validation mechanisms.

The heap profiler service endpoint (/pprof/heap) fails to correctly sanitize the extra_options parameter earlier than passing it to system command execution.

This design flaw permits attackers to inject malicious instructions that execute with the bRPC course of’s privileges.

FieldDetailsCVE IDCVE-2025-60021SeverityImportantAffected VersionsApache bRPC < 1.15.0Vulnerability TypeRemote Command InjectionCVSS CategoryHigh Impression

The foundation trigger stems from inadequate enter validation within the jemalloc reminiscence profiling element, which treats user-supplied parameters as trusted command-line arguments with out escaping or validation.

The vulnerability impacts explicitly deployments that use bRPC’s built-in heap profiler for jemalloc reminiscence profiling.

Any system exposing the /pprof/heap endpoint to untrusted networks faces a major threat of full system compromise.

Exploitation grants attackers distant code execution capabilities with out requiring authentication.

A profitable assault may lead to lateral motion inside community infrastructure, knowledge exfiltration, service disruption, or institution of persistent backdoor entry.

Organizations operating susceptible bRPC variations in manufacturing environments ought to prioritize speedy remediation.

Apache bRPC variations 1.11.0 by 1.14.x are susceptible. Model 1.15.0 and later embody the mandatory safety patches to deal with this vulnerability.

Two mitigation strategies can be found:

Choice 1: Improve Apache bRPC to model 1.15.0 or later, which incorporates the official patch resolving the parameter validation concern.

Choice 2: Apply the safety patch manually from the official Apache bRPC GitHub repository (PR #3101) if speedy model upgrades are infeasible.

Organizations ought to prioritize upgrading to patched variations to get rid of the assault floor. Guide patching must be handled as a short lived measure pending full model upgrades.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Apache, bRPC, Command, Enables, Injection, Remote, Vulnerability

Post navigation

Previous Post: Google Gemini Privacy Controls Bypassed to Access Private Meeting Data Using Calendar Invite
Next Post: ChatGPT Go Launched for $8 USD/month With Support for Ads

Related Posts

kkRAT Employs Network Communication Protocol to Steal Clipboard Contents kkRAT Employs Network Communication Protocol to Steal Clipboard Contents Cyber Security News
Microsoft’s Update Health Tools Configuration Vulnerability Let Attackers Execute Arbitrary Code Remotely Microsoft’s Update Health Tools Configuration Vulnerability Let Attackers Execute Arbitrary Code Remotely Cyber Security News
Web-to-App Funnels: Pros And Cons Web-to-App Funnels: Pros And Cons Cyber Security News
Lite XL Text editor Vulnerability Let Attackers Execute Arbitrary Code Lite XL Text editor Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
1000+ New Fake Domains Mimic Amazon Prime Day Registered to Hunt Online Shoppers 1000+ New Fake Domains Mimic Amazon Prime Day Registered to Hunt Online Shoppers Cyber Security News
Your Tier 1 Analyst at SOC Team Is Failing at Effective Triage Your Tier 1 Analyst at SOC Team Is Failing at Effective Triage Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News