CVE-2025-60021

Apache · Apache bRPC

A critical remote command injection vulnerability exists in the Apache bRPC software.

Executive summary

A critical remote command injection vulnerability exists in the Apache bRPC software. This flaw allows a remote, unauthenticated attacker to execute arbitrary commands on the server by sending a specially crafted request to the built-in heap profiler service. Successful exploitation can lead to a complete compromise of the affected system, including data theft, service disruption, and further network intrusion.

Vulnerability

The bRPC heap profiler built-in service, accessible via the /pprof/heap endpoint, is vulnerable to remote command injection. The service improperly validates the extra_options parameter, passing user-supplied input directly to a command-line execution. An unauthenticated remote attacker can exploit this by crafting a request to the /pprof/heap endpoint with malicious shell commands embedded within the extra_options parameter, resulting in arbitrary code execution with the permissions of the bRPC service.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8. A successful exploit allows an unauthenticated attacker to gain full control over the affected server. Potential consequences include the exfiltration of sensitive data, deployment of ransomware or other malware, complete service disruption, and the ability for an attacker to use the compromised system as a pivot point for further attacks within the organization's network. The ease of exploitation combined with the high impact poses a significant and immediate risk to business operations, data confidentiality, and system integrity.

Remediation

Immediate Action: Organizations must immediately upgrade affected instances of Apache bRPC to version 1.15.0 or later to remediate this vulnerability. If an immediate upgrade is not feasible, the patch available at https://github.com/apache/brpc/pull/3101 should be applied manually. After patching, administrators should monitor for any signs of exploitation attempts by reviewing application and network access logs.

Proactive Monitoring: Security teams should actively monitor web server and application logs for any requests to the /pprof/heap endpoint. Specifically, look for requests containing suspicious or unexpected characters and commands within the extra_options parameter. Monitor system process tables for any unusual child processes being spawned by the bRPC service, which could indicate a successful compromise.

Compensating Controls: If patching or upgrading is not immediately possible, access to the bRPC built-in services, particularly the /pprof/ path, should be restricted at the network level. Use a firewall, reverse proxy, or other network access control lists (ACLs) to ensure that these diagnostic endpoints are only accessible from trusted internal IP addresses. If the heap profiler is not required for production use, it should be disabled entirely as a security best practice.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical CVSS score of 9.8 and the potential for complete system compromise from an unauthenticated attacker, this vulnerability represents a severe risk. We strongly recommend that all organizations using affected versions of Apache bRPC prioritize the deployment of the vendor-supplied patch or upgrade to version 1.15.0 immediately. The lack of current exploitation should not diminish the urgency, as high-severity vulnerabilities like this are attractive targets for attackers. Proactive patching is the most effective defense against potential future exploitation.