PT-2026-3235 · Apache · Apache Brpc
Simcha Kosman
·
Published
2025-09-22
·
Updated
2026-02-02
·
CVE-2025-60021
CVSS v2.0
10
10
Critical
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Apache bRPC and Affected Versions
Apache bRPC versions prior to 1.15.0
Description
Apache bRPC contains a remote command injection flaw in the heap profiler built-in service. The
/pprof/heap endpoint does not properly validate the extra options parameter, allowing attackers to execute arbitrary system commands. This vulnerability enables unauthenticated remote code execution, potentially leading to full system compromise, data theft, and service disruption. The issue stems from the direct concatenation of the unsanitized extra options parameter into a shell command executed with bRPC service privileges. Approximately 4,000 instances are exposed according to ZoomEye. Attackers can leverage this flaw to gain shell access, exfiltrate sensitive data, deploy malware, and move laterally within networks. The vulnerable parameter, extra options, is used in requests to the /pprof/heap API endpoint.Recommendations
Upgrade to Apache bRPC version 1.15.0 or later.
As a temporary workaround, disable the heap profiler in production.
Restrict access to the
/pprof/heap endpoint via network controls and authentication.
Review access logs for /pprof/heap requests with suspicious extra options values.
Inspect spawned processes and verify system integrity.Exploit
Fix
RCE
Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2026-00610
CVE-2025-60021
Affected Products
Apache Brpc
References · 32
- 🔥 https://github.com/ninjazan420/CVE-2025-60021-PoC-Apache-bRPC-Heap-Profiler-Command-Injection · Exploit
- https://osv.dev/vulnerability/CVE-2025-60021 · Vendor Advisory
- https://bdu.fstec.ru/vul/2026-00610 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-60021 · Security Note
- https://lists.apache.org/thread/xy51d2fx6drzhfp92xptsx5845q7b37m · Vendor Advisory
- https://github.com/apache/brpc/pull/3101⭐ 17446 🔗 4090 · Note
- https://t.me/ZerodayAlert/611 · Telegram Post
- https://twitter.com/oss_security/status/2012237241578377435 · Twitter Post
- http://openwall.com/lists/oss-security/2026/01/16/4 · Note
- https://twitter.com/Karma_X_Inc/status/2012528131467366557 · Twitter Post
- https://twitter.com/ThreatSynop/status/2013406813283057879 · Twitter Post
- https://t.me/poxek/5867 · Telegram Post
- https://twitter.com/dailytechonx/status/2013676156583600278 · Twitter Post
- https://twitter.com/arnavsharma/status/2016706594696798406 · Twitter Post
- https://twitter.com/CCBalert/status/2013351905968193581 · Twitter Post