Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Apache bRPC Vulnerability Enables Remote Command Injection

Apache bRPC Vulnerability Enables Remote Command Injection

Posted on January 20, 2026January 20, 2026 By CWS

A crucial distant command-injection vulnerability has been found in Apache bRPC’s built-in heap profiler service, affecting all variations earlier than 1.15.0 throughout all platforms.

The vulnerability permits unauthenticated attackers to execute arbitrary system instructions by manipulating the profiler’s parameter validation mechanisms.

The heap profiler service endpoint (/pprof/heap) fails to correctly sanitize the extra_options parameter earlier than passing it to system command execution.

This design flaw permits attackers to inject malicious instructions that execute with the bRPC course of’s privileges.

FieldDetailsCVE IDCVE-2025-60021SeverityImportantAffected VersionsApache bRPC < 1.15.0Vulnerability TypeRemote Command InjectionCVSS CategoryHigh Impression

The foundation trigger stems from inadequate enter validation within the jemalloc reminiscence profiling element, which treats user-supplied parameters as trusted command-line arguments with out escaping or validation.

The vulnerability impacts explicitly deployments that use bRPC’s built-in heap profiler for jemalloc reminiscence profiling.

Any system exposing the /pprof/heap endpoint to untrusted networks faces a major threat of full system compromise.

Exploitation grants attackers distant code execution capabilities with out requiring authentication.

A profitable assault may lead to lateral motion inside community infrastructure, knowledge exfiltration, service disruption, or institution of persistent backdoor entry.

Organizations operating susceptible bRPC variations in manufacturing environments ought to prioritize speedy remediation.

Apache bRPC variations 1.11.0 by 1.14.x are susceptible. Model 1.15.0 and later embody the mandatory safety patches to deal with this vulnerability.

Two mitigation strategies can be found:

Choice 1: Improve Apache bRPC to model 1.15.0 or later, which incorporates the official patch resolving the parameter validation concern.

Choice 2: Apply the safety patch manually from the official Apache bRPC GitHub repository (PR #3101) if speedy model upgrades are infeasible.

Organizations ought to prioritize upgrading to patched variations to get rid of the assault floor. Guide patching must be handled as a short lived measure pending full model upgrades.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Apache, bRPC, Command, Enables, Injection, Remote, Vulnerability

Post navigation

Previous Post: Google Gemini Privacy Controls Bypassed to Access Private Meeting Data Using Calendar Invite
Next Post: ChatGPT Go Launched for $8 USD/month With Support for Ads

Related Posts

Chinese Hackers Weaponized Nezha Tool to Execute Commands on Web Server Chinese Hackers Weaponized Nezha Tool to Execute Commands on Web Server Cyber Security News
New Agent-Aware Cloaking Leverages OpenAI ChatGPT Atlas Browser to Deliver Fake Content New Agent-Aware Cloaking Leverages OpenAI ChatGPT Atlas Browser to Deliver Fake Content Cyber Security News
Critical React2Shell Vulnerability Under Attack Critical React2Shell Vulnerability Under Attack Cyber Security News
New Blitz Malware Attacking Windows Servers to Deploy Monero Miner New Blitz Malware Attacking Windows Servers to Deploy Monero Miner Cyber Security News
New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers Cyber Security News
Aembit Reveals NHIcon 2026 Agenda & Speakers Aembit Reveals NHIcon 2026 Agenda & Speakers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News