CVE-2025-11953 is a critical (9.8) RCE vulnerability in React Native CLI's Metro server. Unauthenticated attackers can execute commands on dev machines.
| Product | Version Start | Version End (excl.) | Status |
|---|---|---|---|
| react_native_community_cli | 19.0.0 | 19.1.2 | vulnerable |
| react_native_community_cli | 18.0.0 | 18.0.0 | vulnerable |
| react_native_community_cli | 20.0.0 | 20.0.0 | vulnerable |
| react_native_community_cli | 20.0.0 | 20.0.0 | vulnerable |
| react_native_community_cli | 20.0.0 | 20.0.0 | vulnerable |
Update the @react-native-community/cli package to the latest patched version provided by the React Native Community. Ensure that the Metro server configuration is updated to prevent binding to public network interfaces by default.
Immediately upgrade systems running vulnerable versions, specifically version 18.0.0, versions between 19.0.0 and 19.1.1, and version 20.0.0. Ensure your project's package-json and lock files reflect these updates to prevent re-introduction.
Configure the Metro Development Server to bind only to localhost (127.0.0.1) instead of 0.0.0.0. Use local firewall rules or security groups to block external access to the default Metro port (usually 8081) from untrusted networks.
Audit system logs for suspicious POST requests targeting the Metro server endpoint and monitor for unexpected child processes spawned by the Node.js process associated with the React Native CLI, particularly shell executions like cmd.exe or /bin/sh.
Detect exploitation by monitoring network traffic for unauthorized POST requests to the Metro Development Server (default port 8081). On Windows hosts, look for the Node.js process spawning cmd.exe, powershell.exe, or other unexpected executables with suspicious arguments. Security teams should also scan for development environments exposing the Metro server to external interfaces and check for the presence of vulnerable versions in package-lock.json or yarn.lock files across the organization.
Experience superior visibility and a simpler approach to cyber risk management