Critical RCE in React Native Community CLI CVE-2025-11953

BLUF

A critical OS command injection vulnerability (CVSS 9.8) in the @react-native-community/cli NPM package allows unauthenticated remote attackers to execute arbitrary commands on a developer's machine. The flaw stems from the Metro Development Server binding to all network interfaces (0.0.0.0) by default while exposing an unsanitized /open-url endpoint.

Executive Cost Summary

This cost analysis was developed by the CyberDax team using expert judgment and assisted analytical tools to support clarity and consistency.

For organizations affected by CVE-2025-11953 exploitation or suspected abuse:

  • Low-end total cost: $500,000 – $750,000
    (Rapid patching, no chaining, limited exposure)

  • Typical expected range: $1M – $1.8M

  • Upper-bound realistic scenarios: $2.5M – $3.5M
    (Chained exploitation into CI/CD systems, credential compromise, regulatory or customer-driven assurance reviews, prolonged forensic investigation)

Key cost driver:

This vulnerability is dangerous not because it causes immediate outages, but because it quietly undermines trust in developer and build environments. Costs are driven less by downtime and more by the need for assurance, validation, and governance response once administrative boundaries, code integrity, and signing trust are in doubt.

Potential Affected Sectors

·         Software Development

·         Information Technology

·         Mobile App Development

·         Any enterprise employing React Native developers or using CI/CD build agents.

Potential Affected Countries

·         Global (package has ~2 million weekly downloads).

Date of First Reported Activity

·         November 3, 2025

Date of Last Reported Activity Update

·         December 22, 2025

CVE-2025-11953

CVSS 3.1

·         (9.8) AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Nessus ID

There is no plugin for CVE-2025-11953  at this time

Is this on the KEV list

·         No

Patching/Mitigation Data:

Patch Release Date

·         November 3, 2025

Mitigation:

Workaround

·         Manually bind the Metro server to localhost (127.0.0.1)

·         Use firewalls to block external access to port 8081

React Native CLI Fix Commit.

APT Groups

·         No APT groups have been associated with this CVE at this time

Criminal Organization Names

No crime organizations have been associated with this CVE at this time

IOCs

·         Unexpected POST requests to /open-url, /open-stack-frame, /symbolicate, or /debugger-ui on port 8081 from non-local IPs.

·         Presence of calc.exe or unauthorized cmd.exe child processes spawned from the Node.js/Metro server process.

Tools Used

·         Malicious crafted POST requests; open (NPM package)

TTPs

·         T1190 Exploit Public-Facing Application (Metro server exposed on 0.0.0.0).

·         T1059.003 Command and Scripting Interpreter: Windows Shell (Command injection via open() function).

·         T1203 Exploitation for Client Execution (Targeting developer workstations).

Malware Names

TBD (The vulnerability is a delivery mechanism for any payload, such as reverse shells or info-stealers).

Suggested rules / potential hunts

As a reminder these are indicator rules / hunts they are likely to be noisy

Suggested Suricata Rules

alert http $EXTERNAL_NET any -> $HOME_NET 8081 (msg:"Possible CVE-2025-11953 Command Injection Attempt"; flow:established,to_server; content:"POST"; http_method; content:"/open-url"; http_uri; pcre:"/url=.*(&|;|\|)/i"; sid:1000001; rev:1;)

Potential SentinelOne Rules

Monitor node.exe or node processes spawning cmd.exe, powershell.exe, or sh when the parent process command line includes metro or react-native.

Potential Splunk Hunts

index=network sourcetype=http_proxy uri="*/open-url" method="POST" | stats count by src_ip, dest_ip

index=endpoint sourcetype=ProcessRollup parent_process_name="node.exe" (process_name="cmd.exe" OR process_name="powershell.exe") process="*&*" OR process="*;*"

Delivery Method

·         Network-based POST request targeting the exposed Metro development server port (default 8081).

Email Samples

·         This is not applicable.

References

JFrog

hxxps://jfrog.com/blog/cve-2025-11953-critical-react-native-community-cli-vulnerability/

NVD

hxxps://nvd.nist.gov/vuln/detail/CVE-2025-11953

ZeroPath

hxxps://zeropath.com/blog/cve-2025-11953-react-native-metro-cli-os-command-injection

Wiz IO

hxxps://www.wiz.io/vulnerability-database/cve/cve-2025-11953

Developers CloudFlare

hxxps://developers.cloudflare.com/changelog/2025-11-05-emergency-waf-release/

Previous
Previous

WatchGuard Firebox Firewall RCE CVE-2025-14733

Next
Next

SonicWall SMA 1000 Authorization Bypass CVE-2025-40602