Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
React Native Vulnerability Actively Exploited in Attacks

React Native Vulnerability Actively Exploited in Attacks

Posted on February 3, 2026 By CWS

Key Points

  • Critical React Native vulnerability CVE-2025-11953 actively exploited.
  • Vulnerability impacts React Native Community CLI NPM package.
  • Exploitation observed in the wild since December.
  • VulnCheck emphasizes the gap between recognition and exploitation.

Introduction to the React Native Vulnerability

A severe vulnerability in the React Native framework, identified as CVE-2025-11953, has been exploited by threat actors since December, according to recent findings from VulnCheck. This vulnerability is associated with a high CVSS score of 9.8 and affects the React Native Community CLI NPM package, which records approximately two million weekly downloads.

The vulnerability originates from the React Native Community CLI project, which serves as a set of command-line tools derived from the open-source framework aimed at enhancing maintainability. This flaw, along with other vulnerabilities in development servers, traditionally requires local access for exploitation. However, an additional issue in React Native extends exposure to external attackers, as highlighted by JFrog in November.

Exploitation Details and Observations

Despite limited public discourse, VulnCheck has reported active exploitation of the vulnerability, dubbed Metro4Shell. Initial exploitation attempts were noted on December 21, with further activity recorded on January 4 and 21, indicating a sustained malicious operation. Thousands of internet-accessible React Native instances may be susceptible to this vulnerability.

VulnCheck stresses the significance of the gap between observed exploitation and broader awareness, noting that easily exploitable vulnerabilities, which are exposed on the public internet, pose substantial risks. The Metro4Shell vulnerability resides in Metro, a JavaScript bundler and development server utilized during the development and testing of React Native applications.

Technical Analysis of the Exploit

By default, Metro can bind to external interfaces, making deployments vulnerable to unauthenticated remote OS command execution through straightforward POST requests. VulnCheck documented that attackers utilize a multi-stage PowerShell-based loader, which deactivates Microsoft Defender protections, establishes a raw TCP connection to the attacker’s server, sends a GET request, and executes the received payload.

The payload, written in Rust, incorporates basic anti-analysis logic and targets both Windows and Linux operating systems. VulnCheck’s analysis reveals that this approach to disabling security measures before payload retrieval reflects an awareness of endpoint security controls and the incorporation of evasion tactics into the attack’s initial execution flow.

Conclusion

The React Native vulnerability, CVE-2025-11953, underscores the ongoing challenges in software security, particularly how development infrastructure can inadvertently transition to production environments. This case highlights the critical need for heightened awareness and proactive measures to safeguard against such exploitations. As this vulnerability continues to be exploited in the wild, developers and security professionals must remain vigilant to protect their systems and infrastructure.

Security Week News Tags:CVE-2025-11953, Cybersecurity, developer tools, Exploit, JavaScript, Metro4Shell, React Native, Software Security, supply chain security, Vulnerability

Post navigation

Previous Post: Phishing Alert: Fake Party Invites Install Remote Access Software
Next Post: French Officials Raid X for Alleged Cybercrime Activities

Related Posts

Feds Seize Password Database Used in Massive Bank Account Takeover Scheme Feds Seize Password Database Used in Massive Bank Account Takeover Scheme Security Week News
1Kosmos Raises  Million for Identity Verification and Authentication Platform 1Kosmos Raises $57 Million for Identity Verification and Authentication Platform Security Week News
Zero Trust Is 15 Years Old — Why Full Adoption Is Worth the Struggle Zero Trust Is 15 Years Old — Why Full Adoption Is Worth the Struggle Security Week News
Technical Details Published for Critical Cisco IOS XE Vulnerability Technical Details Published for Critical Cisco IOS XE Vulnerability Security Week News
ThreatSpike Raises  Million in Series A Funding ThreatSpike Raises $14 Million in Series A Funding Security Week News
AI Guardrails Under Fire: Cisco’s Jailbreak Demo Exposes AI Weak Points AI Guardrails Under Fire: Cisco’s Jailbreak Demo Exposes AI Weak Points Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Target React Server Components for Cyber Attacks
  • Microsoft’s Plan to Phase Out NTLM for Enhanced Security
  • Growing Infostealer Threat Targets macOS Using Python
  • GlassWorm Exploits VSX Extensions to Target Developers
  • Advanced PDFly Malware Variant Utilizes Custom Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Target React Server Components for Cyber Attacks
  • Microsoft’s Plan to Phase Out NTLM for Enhanced Security
  • Growing Infostealer Threat Targets macOS Using Python
  • GlassWorm Exploits VSX Extensions to Target Developers
  • Advanced PDFly Malware Variant Utilizes Custom Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark