Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
React Native Vulnerability Actively Exploited in Attacks

React Native Vulnerability Actively Exploited in Attacks

Posted on February 3, 2026 By CWS

Key Points

  • Critical React Native vulnerability CVE-2025-11953 actively exploited.
  • Vulnerability impacts React Native Community CLI NPM package.
  • Exploitation observed in the wild since December.
  • VulnCheck emphasizes the gap between recognition and exploitation.

Introduction to the React Native Vulnerability

A severe vulnerability in the React Native framework, identified as CVE-2025-11953, has been exploited by threat actors since December, according to recent findings from VulnCheck. This vulnerability is associated with a high CVSS score of 9.8 and affects the React Native Community CLI NPM package, which records approximately two million weekly downloads.

The vulnerability originates from the React Native Community CLI project, which serves as a set of command-line tools derived from the open-source framework aimed at enhancing maintainability. This flaw, along with other vulnerabilities in development servers, traditionally requires local access for exploitation. However, an additional issue in React Native extends exposure to external attackers, as highlighted by JFrog in November.

Exploitation Details and Observations

Despite limited public discourse, VulnCheck has reported active exploitation of the vulnerability, dubbed Metro4Shell. Initial exploitation attempts were noted on December 21, with further activity recorded on January 4 and 21, indicating a sustained malicious operation. Thousands of internet-accessible React Native instances may be susceptible to this vulnerability.

VulnCheck stresses the significance of the gap between observed exploitation and broader awareness, noting that easily exploitable vulnerabilities, which are exposed on the public internet, pose substantial risks. The Metro4Shell vulnerability resides in Metro, a JavaScript bundler and development server utilized during the development and testing of React Native applications.

Technical Analysis of the Exploit

By default, Metro can bind to external interfaces, making deployments vulnerable to unauthenticated remote OS command execution through straightforward POST requests. VulnCheck documented that attackers utilize a multi-stage PowerShell-based loader, which deactivates Microsoft Defender protections, establishes a raw TCP connection to the attacker’s server, sends a GET request, and executes the received payload.

The payload, written in Rust, incorporates basic anti-analysis logic and targets both Windows and Linux operating systems. VulnCheck’s analysis reveals that this approach to disabling security measures before payload retrieval reflects an awareness of endpoint security controls and the incorporation of evasion tactics into the attack’s initial execution flow.

Conclusion

The React Native vulnerability, CVE-2025-11953, underscores the ongoing challenges in software security, particularly how development infrastructure can inadvertently transition to production environments. This case highlights the critical need for heightened awareness and proactive measures to safeguard against such exploitations. As this vulnerability continues to be exploited in the wild, developers and security professionals must remain vigilant to protect their systems and infrastructure.

Security Week News Tags:CVE-2025-11953, Cybersecurity, developer tools, Exploit, JavaScript, Metro4Shell, React Native, Software Security, supply chain security, Vulnerability

Post navigation

Previous Post: Phishing Alert: Fake Party Invites Install Remote Access Software
Next Post: French Officials Raid X for Alleged Cybercrime Activities

Related Posts

Cybersecurity M&A Roundup: 30 Deals Announced in December 2025 Cybersecurity M&A Roundup: 30 Deals Announced in December 2025 Security Week News
Security Theater or Real Defense? The KPIs That Tell the Truth Security Theater or Real Defense? The KPIs That Tell the Truth Security Week News
Hacker Conversations: Rachel Tobac and the Art of Social Engineering Hacker Conversations: Rachel Tobac and the Art of Social Engineering Security Week News
Industrial Giants Schneider Electric and Emerson Named as Victims of Oracle Hack Industrial Giants Schneider Electric and Emerson Named as Victims of Oracle Hack Security Week News
Pennsylvania Attorney General Confirms Ransomware Behind Weeks-Long Outage Pennsylvania Attorney General Confirms Ransomware Behind Weeks-Long Outage Security Week News
Chinese APT Uses ‘Airstalk’ Malware in Supply Chain Attacks Chinese APT Uses ‘Airstalk’ Malware in Supply Chain Attacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News