Critical React Native Metro dev server bug under attack as researchers scream into the void

Critical React Native Metro dev server bug under attack as researchers scream into the void

Summary

Security researchers have observed active exploitation of a critical command-injection flaw in the Metro development server used by the React Native Community CLI (CVE-2025-11953). The vulnerability allows unauthenticated attackers to send requests that execute arbitrary code on affected Windows and Linux systems. Proof-of-concept exploits were published quickly after disclosure, and real-world attacks delivering multi-stage payloads have been seen in the wild.

Key Points

  • The flaw is in the React Native Community CLI’s Metro dev server endpoint and is tracked as CVE-2025-11953.
  • The package is widely used (around 2.5 million weekly downloads), increasing exposure among developers and build environments.
  • Unauthenticated network attackers can run malicious executables or arbitrary shell commands via a POST request.
  • JFrog and VulnCheck observed exploitation starting in December; proof-of-concept code appeared the day the bug was disclosed.
  • Observed attacks used a PowerShell-based loader that disabled Microsoft Defender before fetching a Rust binary with anti-analysis tricks.
  • Researchers warn that EPSS currently underrates the exploitation probability despite clear, internet-exposed targets.
  • Specific attacker infrastructure (IP addresses and payload hosts) has been identified by researchers.

Content summary

JFrog researchers discovered the Metro dev server bug and disclosed it after Meta issued a fix. The weakness exposes an endpoint that can be abused for OS command injection, giving attackers a remote lane into developer machines and CI hosts. Attackers delivered a multi-stage payload—initial loader executed via cmd.exe/PowerShell which disables Defender and then retrieves a Rust binary designed to evade analysis. Exploitation was seen in December and continued into January.

Context and relevance

Developer tooling is an attractive target: widely installed, inconsistently monitored, and often treated as non-production software on laptops and CI systems. A critical vulnerability in a ubiquitous package like the React Native CLI can enable supply-chain style compromises, lateral movement in developer networks, and direct infection of build artefacts or app packages.

Why should I read this

If you work with React Native or run developer machines and CI systems, this matters — big time. It’s an easy-to-exploit, high-severity hole in tooling that sits on dev endpoints. Patch the CLI, check internet-exposed ports for Metro servers, hunt for the described PowerShell loader or unexpected Rust binaries, and review logs for connections to the listed IPs/hosts. We did the digging so you can act fast.

Source

Source: https://go.theregister.com/feed/www.theregister.com/2026/02/03/critical_react_native_metro_server/