Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Apache bRPC Vulnerability Enables Remote Command Injection

Posted on January 20, 2026January 20, 2026 By CWS

A crucial distant command-injection vulnerability has been found in Apache bRPC’s built-in heap profiler service, affecting all variations earlier than 1.15.0 throughout all platforms.

The vulnerability permits unauthenticated attackers to execute arbitrary system instructions by manipulating the profiler’s parameter validation mechanisms.

The heap profiler service endpoint (/pprof/heap) fails to correctly sanitize the extra_options parameter earlier than passing it to system command execution.

This design flaw permits attackers to inject malicious instructions that execute with the bRPC course of’s privileges.

FieldDetailsCVE IDCVE-2025-60021SeverityImportantAffected VersionsApache bRPC < 1.15.0Vulnerability TypeRemote Command InjectionCVSS CategoryHigh Impression

The foundation trigger stems from inadequate enter validation within the jemalloc reminiscence profiling element, which treats user-supplied parameters as trusted command-line arguments with out escaping or validation.

The vulnerability impacts explicitly deployments that use bRPC’s built-in heap profiler for jemalloc reminiscence profiling.

Any system exposing the /pprof/heap endpoint to untrusted networks faces a major threat of full system compromise.

Exploitation grants attackers distant code execution capabilities with out requiring authentication.

A profitable assault may lead to lateral motion inside community infrastructure, knowledge exfiltration, service disruption, or institution of persistent backdoor entry.

Organizations operating susceptible bRPC variations in manufacturing environments ought to prioritize speedy remediation.

Apache bRPC variations 1.11.0 by 1.14.x are susceptible. Model 1.15.0 and later embody the mandatory safety patches to deal with this vulnerability.

Two mitigation strategies can be found:

Choice 1: Improve Apache bRPC to model 1.15.0 or later, which incorporates the official patch resolving the parameter validation concern.

Choice 2: Apply the safety patch manually from the official Apache bRPC GitHub repository (PR #3101) if speedy model upgrades are infeasible.

Organizations ought to prioritize upgrading to patched variations to get rid of the assault floor. Guide patching must be handled as a short lived measure pending full model upgrades.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Apache, bRPC, Command, Enables, Injection, Remote, Vulnerability

Post navigation

Previous Post: Google Gemini Privacy Controls Bypassed to Access Private Meeting Data Using Calendar Invite
Next Post: ChatGPT Go Launched for $8 USD/month With Support for Ads

Related Posts

Docker Open Sources Production-Ready Hardened Images for Free Cyber Security News
NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation Cyber Security News
APT36 Attacking BOSS Linux Systems With Weaponized ZIP Files to Steal Sensitive Data Cyber Security News
Microsoft to Cancel Plans Imposing Daily Limit For Exchange Online Bulk E-mails Cyber Security News
Ransomware Operations Surge Following Qilin’s New Pattern of Attacks Cyber Security News
Critical Ivanti Endpoint Manager Vulnerabilities Let Attackers Execute Remote Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical AVEVA Software Vulnerabilities Enables Remote Code Execution Under System Privileges
  • Tudou Guarantee Marketplace Halts Telegram Transactions After Processing Over $12 Billion
  • Pulsar RAT Using Memory-Only Execution & HVNC to Gain Invisible Remote Access
  • ChatGPT Go Launched for $8 USD/month With Support for Ads
  • Apache bRPC Vulnerability Enables Remote Command Injection

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical AVEVA Software Vulnerabilities Enables Remote Code Execution Under System Privileges
  • Tudou Guarantee Marketplace Halts Telegram Transactions After Processing Over $12 Billion
  • Pulsar RAT Using Memory-Only Execution & HVNC to Gain Invisible Remote Access
  • ChatGPT Go Launched for $8 USD/month With Support for Ads
  • Apache bRPC Vulnerability Enables Remote Command Injection

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark