Critical vulnerability in React Native development tool actively exploited
Briefly

Critical vulnerability in React Native development tool actively exploited
"Attackers are actively exploiting a critical vulnerability in React Native's Metro server to infiltrate development environments. The vulnerability, CVE-2025-11953, allows malicious actors to execute code on Windows and Linux systems via exposed development servers. Metro is React Native's default JavaScript bundler during application development and testing. In many configurations, this server runs locally, but by default, Metro can also bind to external network interfaces. This makes HTTP endpoints available that are intended for development. It is precisely this functionality that now constitutes an attack vector,"
"Researchers discovered that the /open-url endpoint accepts POST requests with a supplied URL that is passed on to an internal function without being checked. This allows an attacker on Windows to execute arbitrary system commands without authentication. On Linux and macOS, it is possible to launch executable files, with limited control over parameters. The issue affects versions of @react-native-community/cli-server-api from 4.8.0 through 20.0.0-alpha.2. The vulnerability has been fixed in version 20.0.0 and newer, but many development environments appear to still be vulnerable."
CVE-2025-11953 allows unauthenticated remote code execution through React Native's Metro server when its development HTTP endpoints are exposed. The /open-url endpoint forwards a supplied URL to an internal function without validation, enabling command execution on Windows and executable launches on Linux and macOS. The vulnerability affects @react-native-community/cli-server-api versions 4.8.0 through 20.0.0-alpha.2 and is fixed in 20.0.0 and later. Proof-of-concept exploits and real-world attacks have been observed. Attackers delivered base64-encoded PowerShell via POST requests, disabled Microsoft Defender by adding directory exceptions, connected back to attacker infrastructure over TCP, retrieved additional malware, and executed files from the temporary directory.
Read at Techzine Global
Unable to calculate read time
[
|
]