Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Apache bRPC Vulnerability Enables Remote Command Injection

Posted on January 20, 2026January 20, 2026 By CWS

A crucial distant command-injection vulnerability has been found in Apache bRPC’s built-in heap profiler service, affecting all variations earlier than 1.15.0 throughout all platforms.

The vulnerability permits unauthenticated attackers to execute arbitrary system instructions by manipulating the profiler’s parameter validation mechanisms.

The heap profiler service endpoint (/pprof/heap) fails to correctly sanitize the extra_options parameter earlier than passing it to system command execution.

This design flaw permits attackers to inject malicious instructions that execute with the bRPC course of’s privileges.

FieldDetailsCVE IDCVE-2025-60021SeverityImportantAffected VersionsApache bRPC < 1.15.0Vulnerability TypeRemote Command InjectionCVSS CategoryHigh Impression

The foundation trigger stems from inadequate enter validation within the jemalloc reminiscence profiling element, which treats user-supplied parameters as trusted command-line arguments with out escaping or validation.

The vulnerability impacts explicitly deployments that use bRPC’s built-in heap profiler for jemalloc reminiscence profiling.

Any system exposing the /pprof/heap endpoint to untrusted networks faces a major threat of full system compromise.

Exploitation grants attackers distant code execution capabilities with out requiring authentication.

A profitable assault may lead to lateral motion inside community infrastructure, knowledge exfiltration, service disruption, or institution of persistent backdoor entry.

Organizations operating susceptible bRPC variations in manufacturing environments ought to prioritize speedy remediation.

Apache bRPC variations 1.11.0 by 1.14.x are susceptible. Model 1.15.0 and later embody the mandatory safety patches to deal with this vulnerability.

Two mitigation strategies can be found:

Choice 1: Improve Apache bRPC to model 1.15.0 or later, which incorporates the official patch resolving the parameter validation concern.

Choice 2: Apply the safety patch manually from the official Apache bRPC GitHub repository (PR #3101) if speedy model upgrades are infeasible.

Organizations ought to prioritize upgrading to patched variations to get rid of the assault floor. Guide patching must be handled as a short lived measure pending full model upgrades.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Apache, bRPC, Command, Enables, Injection, Remote, Vulnerability

Post navigation

Previous Post: Google Gemini Privacy Controls Bypassed to Access Private Meeting Data Using Calendar Invite
Next Post: ChatGPT Go Launched for $8 USD/month With Support for Ads

Related Posts

Windows 11 24H2/25H2 Update Causes Task Manager to be Active After Closure Cyber Security News
Threat Actors Using CrossC2 Tool to Expand Cobalt Strike to Operate on Linux and macOS Cyber Security News
The Most Active RAT Uses New Stagers and Loaders to Bypass Defenses Cyber Security News
First AI Ransomware ‘PromptLock’ Uses OpenAI gpt-oss-20b Model for Encryption Cyber Security News
Synology BeeStation 0-Day Vulnerability Let Remote Attackers Execute Arbitrary Code Cyber Security News
Mozilla High Severity Vulnerabilities Enables Remote Code Execution Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Attackers Abuse Discord to Deliver Clipboard Hijacker That Steals Wallet Addresses on Paste
  • Critical AVEVA Software Vulnerabilities Enables Remote Code Execution Under System Privileges
  • Tudou Guarantee Marketplace Halts Telegram Transactions After Processing Over $12 Billion
  • Pulsar RAT Using Memory-Only Execution & HVNC to Gain Invisible Remote Access
  • ChatGPT Go Launched for $8 USD/month With Support for Ads

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Attackers Abuse Discord to Deliver Clipboard Hijacker That Steals Wallet Addresses on Paste
  • Critical AVEVA Software Vulnerabilities Enables Remote Code Execution Under System Privileges
  • Tudou Guarantee Marketplace Halts Telegram Transactions After Processing Over $12 Billion
  • Pulsar RAT Using Memory-Only Execution & HVNC to Gain Invisible Remote Access
  • ChatGPT Go Launched for $8 USD/month With Support for Ads

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark