CVE-2025-60021

Source
https://cve.org/CVERecord?id=CVE-2025-60021
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-60021.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-60021
Published
2026-01-16T09:16:03.127Z
Modified
2026-01-23T05:50:48.463474Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Remote command injection vulnerability in heap profiler builtin service in Apache bRPC ((all versions < 1.15.0)) on all platforms allows attacker to inject remote command.

Root Cause: The bRPC heap profiler built-in service (/pprof/heap) does not validate the user-provided extraoptions parameter and executes it as a command-line argument. Attackers can execute remote commands using the extraoptions parameter..

Affected scenarios: Use the built-in bRPC heap profiler service to perform jemalloc memory profiling.

How to Fix: we provide two methods, you can choose one of them:

  1. Upgrade bRPC to version 1.15.0.
  2. Apply this patch ( https://github.com/apache/brpc/pull/3101 ) manually.
References

Affected packages

Git / github.com/apache/brpc

Affected ranges

Type
GIT
Repo
https://github.com/apache/brpc
Events

Affected versions

1.*
1.11.0
1.13.0
1.14.0
1.14.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-60021.json"