Critical OS Command Injection Flaw Found in React Native CLI

Critical Command Injection Vulnerability Discovered and Patched in @react-native-community/cli Affecting Metro Development Server

  • A critical security flaw in the @react-native-community/cli npm package has been identified and fixed.
  • The flaw allowed remote attackers to execute operating system commands without authentication.
  • This vulnerability, CVE-2025-11953, has a severity score of 9.8 out of 10.
  • Affected versions ranged from 4.8.0 to 20.0.0-alpha.2, patched in version 20.0.0.
  • The issue involved the Metro development server exposing an endpoint vulnerable to command injection.

A critical security weakness was discovered and patched in the popular @react-native-community/cli package, which supports developers building React Native mobile apps. The vulnerability could let unauthenticated attackers execute harmful operating system commands on machines running the development server. The details were reported on November 4, 2025.

- Advertisement -

According to JFrog Senior Security Researcher Or Peles, the flaw is tracked as CVE-2025-11953 and carries a critical CVSS score of 9.8 out of 10. It affected the command-line interface versions 4.8.0 through 20.0.0-alpha.2 and was fixed in release 20.0.0.

The exposed vulnerability stemmed from the Metro development server binding to external network interfaces by default rather than just localhost. This server exposes an “/open-url” endpoint that accepts POST requests. The user input sent to this endpoint is passed unsafely to a function from the open NPM package, allowing attackers to run arbitrary OS commands.

Peles explained, “The server’s ‘/open-url’ endpoint handles a POST request that includes a user-input value that is passed to the unsafe open() function provided by the open NPM package, which will cause OS command execution.” On Windows systems, this permits executing shell commands with full argument control. On Linux and macOS, attackers can run arbitrary binaries with some parameter restrictions.

The package is maintained by Meta and downloads range between 1.5 million and 2 million weekly. Developers using React Native with frameworks that do not rely on the Metro server are not affected. As Peles noted, “This zero day vulnerability is particularly dangerous due to its ease of exploitation, lack of authentication requirements and broad attack surface.” The issue highlights risks in third-party components and underscores the importance of automated security testing in software supply chains.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Trump-linked WLFI token stakers get exclusive stablecoin profit

World Liberty Financial has proposed a governance overhaul requiring WLFI holders to stake tokens...

Bitcoin ETF Inflows Hit $506M, Highest Since February

U.S. spot Bitcoin ETF inflows surged to $506 million, their highest level since early...

Nvidia Networking Sales Soar 143%, Outpace Data Center

NVIDIA's data center networking sales skyrocketed 143% year-over-year, reaching $31.34 billion for fiscal year...

Gate.io gets EU payment license in Malta

Gate obtained a Payment Institution license in Malta under the EU's PSD2 framework.The license...

Must Read

Best Crypto Audiobooks of 2026: The Ultimate Listen & Learn Guide

You can't read Bitcoin charts while driving 70 mph on the highway. You can't study Ethereum whitepapers during your morning run. But you can...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!