Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
React Native’s Metro Server Targeted by Hackers

React Native’s Metro Server Targeted by Hackers

Posted on February 3, 2026 By CWS

Key Points

  • Critical vulnerability in React Native’s Metro Server exploited by hackers.
  • Known as CVE-2025-11953, it allows remote code execution.
  • Attacks target both Windows and Linux systems.
  • Mitigation requires upgrading development tools.

Exploitation of React Native’s Vulnerability

Cyber attackers are actively leveraging a severe vulnerability found in the Metro Development Server, a core component of React Native’s development framework, to deploy sophisticated malware. This vulnerability, identified as CVE-2025-11953 and nicknamed “Metro4Shell,” was first detected by VulnCheck’s Canary honeypot network in late December 2025, with continued activity into early 2026. Despite its critical nature, it has received limited public attention.

The flaw affects the Metro Development Server included with the @react-native-community/cli npm package, a vital tool for developing React Native applications. It originates from the server’s default setting, which exposes an endpoint vulnerable to OS command injection, allowing attackers to execute arbitrary commands remotely.

Technical Details and Impact

Researchers from JFrog highlighted that this vulnerability stems from user-controlled input being passed to the unsafe open() function from the open npm package. This flaw permits unauthorized attackers to run arbitrary shell commands without authentication. On Windows, attackers can control command execution entirely, while on macOS and Linux, they can launch executables.

Despite the vulnerability’s high CVSS score of 9.8, indicative of its critical status, the Exploit Prediction Scoring System (EPSS) assigns it a low probability of exploitation, starkly contrasting with the observed reality of consistent attacks.

Attack Methodology and Response

VulnCheck’s analysis shows that these attacks are not exploratory but are part of a well-coordinated campaign. The attackers use a multi-stage PowerShell-based loader, initially encoded in Base64 to avoid detection, which then executes a sequence designed to bypass security measures and establish a persistent presence on the target system.

The attack sequence involves adding exclusions in Microsoft Defender for specific directories to avoid antivirus scanning, followed by establishing a TCP connection to retrieve further malicious payloads. The malware, found to be UPX-packed and Rust-based, is sophisticated enough to employ anti-analysis techniques, complicating static inspections.

Mitigation Strategies

Organizations utilizing React Native for development are urged to upgrade to @react-native-community/cli version 20.0.0 or later, as this version addresses the vulnerability. It is essential to treat development environments with the same security rigor as production systems, ensuring that Metro Development Servers are not exposed to untrusted networks and are isolated through network segmentation.

This vulnerability underscores the need for immediate action when vulnerabilities are identified, rather than waiting for official advisories or consensus. Developer tools are particularly attractive targets due to their widespread use and often lax security measures.

Conclusion

The exploitation of CVE-2025-11953 in React Native’s Metro Server exemplifies the urgent need for developers and organizations to stay ahead of threat actors by promptly implementing security patches and following best practices in network security.

Cyber Security News Tags:CVE-2025-11953, Cybersecurity, developer tools, JFrog, Linux, macOS, Malware, Metro Server, Metro4Shell, network security, React Native, remote code execution, VulnCheck, Vulnerability, Windows

Post navigation

Previous Post: Critical Patch Secures OpenClaw AI Against Hijacking
Next Post: Critical XSS Flaws in Foxit PDF Editor Expose Users to Risk

Related Posts

Penetration Testing in the AI Era Tools and Techniques Penetration Testing in the AI Era Tools and Techniques Cyber Security News
Microsoft Purview DLP to Restrict Microsoft 365 Copilot in Processing Emails With Sensitive Labels Microsoft Purview DLP to Restrict Microsoft 365 Copilot in Processing Emails With Sensitive Labels Cyber Security News
Ransomware incidents Targeting Japan Increased by Approximately 1.4 Times Ransomware incidents Targeting Japan Increased by Approximately 1.4 Times Cyber Security News
ExpressVPN Windows Client Vulnerability Exposes Users Real IP Addresses With RDP Connection ExpressVPN Windows Client Vulnerability Exposes Users Real IP Addresses With RDP Connection Cyber Security News
New Agent-Aware Cloaking Leverages OpenAI ChatGPT Atlas Browser to Deliver Fake Content New Agent-Aware Cloaking Leverages OpenAI ChatGPT Atlas Browser to Deliver Fake Content Cyber Security News
Multi-Staged ValleyRAT Uses WeChat and DingTalk to Attack Windows Users Multi-Staged ValleyRAT Uses WeChat and DingTalk to Attack Windows Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Target React Server Components for Cyber Attacks
  • Microsoft’s Plan to Phase Out NTLM for Enhanced Security
  • Growing Infostealer Threat Targets macOS Using Python
  • GlassWorm Exploits VSX Extensions to Target Developers
  • Advanced PDFly Malware Variant Utilizes Custom Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Target React Server Components for Cyber Attacks
  • Microsoft’s Plan to Phase Out NTLM for Enhanced Security
  • Growing Infostealer Threat Targets macOS Using Python
  • GlassWorm Exploits VSX Extensions to Target Developers
  • Advanced PDFly Malware Variant Utilizes Custom Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark