Hackers Exploit Critical React Native Metro Bug to Breach Dev Systems
#Vulnerabilities

Hackers Exploit Critical React Native Metro Bug to Breach Dev Systems

Security Reporter
4 min read

Critical vulnerability in React Native's Metro bundler enables remote code execution on developer systems, with active exploitation delivering cross-platform malware.

![Featured image](Featured image)

Critical Vulnerability Enables Remote Code Execution

A critical vulnerability in React Native's Metro server, tracked as CVE-2025-11953, is being actively exploited by hackers to breach developer systems and deliver malicious payloads across Windows and Linux platforms. The flaw, discovered by researchers at JFrog, affects the default JavaScript bundler for React Native projects and could allow unauthenticated attackers to execute arbitrary commands on vulnerable systems.

How the Attack Works

The vulnerability stems from the /open-url HTTP endpoint in Metro, which accepts POST requests containing user-supplied URL values that are passed unsanitized to the open() function. This creates a dangerous attack vector that can be exploited in different ways depending on the operating system:

On Windows: Attackers can execute arbitrary OS commands via POST requests without authentication

On Linux and macOS: The vulnerability allows running arbitrary executables with limited parameter control

Active Exploitation Campaign

Vulnerability intelligence company VulnCheck has observed a threat actor actively exploiting this vulnerability, dubbed Metro4Shell, since December 21, 2025. The attacks have continued through January 4th and 21st, demonstrating that this provides a practical, cross-platform initial access mechanism.

Attack Chain Details

In all observed attacks, researchers noted the delivery of base-64 encoded PowerShell payloads hidden in the HTTP POST body of malicious requests. Once decoded and executed, these payloads perform a sophisticated sequence of actions:

  1. Disable endpoint protections by adding Microsoft Defender exclusion paths for both the current working directory and system temporary directory using Add-MpPreference

  2. Establish a raw TCP connection to attacker-controlled infrastructure and issue a GET /windows request to retrieve the next-stage payload

  3. Write the received data to disk as an executable file in the system's temporary directory

  4. Execute the downloaded binary with a large, attacker-supplied argument string

Technical Analysis of the Malware

The Windows payload retrieved in these attacks is particularly sophisticated. It's a Rust-based UPX-packed binary with basic anti-analysis logic designed to evade detection. The same attacker infrastructure hosted a corresponding "linux" binary, indicating that the campaign is designed to target both major platforms used by developers.

Scope and Risk Assessment

Approximately 3,500 exposed React Native Metro servers are accessible online, according to scans using the ZoomEye search engine for connected devices, services, and web applications. Despite active exploitation being observed for over a month, the vulnerability still carries a low score in the Exploit Prediction Scoring System (EPSS), a risk assessment framework that estimates the likelihood of exploitation for security issues.

Mitigation and Protection

Organizations are urged to take immediate action to protect their development environments. The vulnerability affects @react-native-community/cli-server-api versions 4.8.0 through 20.0.0-alpha.2, and was fixed in version 20.0.0 and later.

  • Update immediately to React Native Metro version 20.0.0 or later
  • Restrict network access to Metro servers, ensuring they only bind to local interfaces during development
  • Monitor network traffic for suspicious POST requests to /open-url endpoints
  • Implement network segmentation to isolate development environments from production systems

"Organizations cannot afford to wait for CISA KEV inclusion, vendor reports, or broad consensus before taking action," the researchers warn.

Indicators of Compromise

VulnCheck's report includes indicators of compromise (IoCs) for the attacker network infrastructure as well as Windows and Linux payloads. Development teams should review these IoCs and implement appropriate detection rules in their security monitoring systems.

Broader Context

This attack highlights the growing trend of targeting software development infrastructure as an entry point for broader compromises. Similar patterns have been observed in recent attacks against:

  • Cisco AsyncOS zero-day exploits
  • VMware RCE flaws
  • Fortinet FortiSIEM vulnerabilities
  • Trend Micro remote code execution bugs

These attacks demonstrate that threat actors are increasingly focusing on the software supply chain and development environments, recognizing them as critical weak points in organizational security.

Conclusion

The active exploitation of CVE-2025-11953 represents a significant threat to React Native developers and organizations using this popular framework. With sophisticated cross-platform malware being delivered through this vulnerability and thousands of potentially exposed servers online, immediate action is required to secure development environments and prevent compromise.

Development teams should prioritize updating their Metro server installations and implementing network controls to prevent unauthorized access to development endpoints. The combination of remote code execution capabilities and the widespread use of React Native makes this vulnerability particularly dangerous in the current threat landscape.

Comments

Loading comments...