Categories: Cyber Security News

Severe RCE Flaw in Widely Used React Native NPM Library Puts Developers at Risk

Security researchers at JFrog have identified a critical remote code execution vulnerability affecting millions of React Native developers worldwide.

The flaw, tracked as CVE-2025-11953, impacts the widely-used @react-native-community/cli-server-api NPM package, which maintains approximately two million weekly downloads.

The vulnerability carries a maximum CVSS 3.1 score of 9.8, indicating its severity and ease of exploitation by unauthenticated attackers with minimal technical barriers.

The vulnerability exists in versions 4.8.0 through 20.0.0-alpha.2 of the affected package and enables remote attackers to execute arbitrary operating system commands on machines running React Native’s development server without requiring authentication or user interaction.

react-native’s development server (Metro) running

This represents a significant threat to developers working on mobile applications, as exploitation could lead to complete system compromise and unauthorized access to source code and credentials.

Understanding the Technical Flaw

The security flaw originates from unsafe handling of user input in the Metro development server’s /open-url endpoint.

When developers run common commands such as npm start or npx react-native start To launch their development environment, the server processes POST requests containing unsanitized data that gets passed directly to the dangerous open() function from the open NPM package.

This function executes system-level commands without proper validation, creating a clear pathway for attackers to inject malicious commands.

Researchers demonstrated complete arbitrary command execution with full parameter control on Windows systems.

The vulnerability allows attackers to execute shell commands by crafting malicious requests that bypass basic sanitization attempts.

While macOS and Linux systems show slightly more restricted exploitation paths due to different code execution mechanisms, researchers believe arbitrary command execution remains achievable with additional research on these platforms.

Compounding the problem, JFrog discovered a secondary vulnerability in React Native’s core codebase where the development server binds to all network interfaces rather than localhost only, despite displaying messages indicating localhost-only operation.

This misconfiguration transforms what might have been a local-only security issue into a remotely exploitable critical vulnerability, as the development endpoints become accessible to network attackers.

Vulnerability Details

CVE ID Affected Product Affected Versions CVSS Score Vulnerability Type
CVE-2025-11953 @react-native-community/cli-server-api 4.8.0 to 20.0.0-alpha.2 9.8 (Critical) Remote Code Execution (RCE)

Developers who initiated React Native projects using vulnerable versions of @react-native-community/cli and run the Metro development server through standard commands are at immediate risk.

To verify if your project contains the vulnerable package, navigate to your project folder and run npm list @react-native-community/cli-server-api.

The package may also be globally installed on your system, which can be checked using npm list -g @react-native-community/cli-server-api.

Meta’s security team has responded promptly by releasing a patch in version 20.0.0 of the affected package. Developers should immediately update @react-native-community/cli-server-api to version 20.0.0 or higher in all their React Native projects.

For situations where upgrading proves difficult, developers can mitigate risk by explicitly binding the development server to the localhost interface using the –host 127.0.0.1 flag when starting the server, such as npx react-native start –host 127.0.0.1.

Developers using frameworks like Expo that employ different development servers are typically not affected by this vulnerability.

This discovery highlights how critical remote code execution flaws continue appearing in production software, particularly when dangerous functions reside in third-party dependencies.

The vulnerability serves as a stark reminder that secure coding practices and automated security scanning remain essential for preventing easily exploitable flaws before they reach production environments.

Development teams should prioritize immediate patching and implement network-level controls to restrict access to development servers during the transition period.

Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA's Diamond Membership: Join Today

The post Severe RCE Flaw in Widely Used React Native NPM Library Puts Developers at Risk appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Alien: Isolation 2 Seemingly Teased in New Video Posted by Sega and Creative Assembly

Publisher Sega and developer Creative Assembly have revealed what appears to be a teaser trailer…

26 minutes ago

Trump Uses Shooting Outside White House Correspondents’ Dinner to Boost Corrupt Ballroom Project

US President Donald Trump used a lone gunman’s storming of the lobby outside the White House Correspondents’ Dinner on…

37 minutes ago

Free activities galore at UMass Founders Day 2026 event

AMHERST — Performances by local and student bands, an art walk at campus galleries and…

2 hours ago

Community Legal Aid gets grant to help seal eviction cases

GREENFIELD — Aided by grant funding, the nonprofit law organization providing free services to low-income…

2 hours ago

Area Briefs: Children’s Advocacy Center luminaria event

Children’s Advocacy Center luminaria event NORTHAMPTON — The Children’s Advocacy Center (CAC) of Hampshire County…

2 hours ago

Chesterfield appoints new Council on Aging director

CHESTERFIELD — For the fourth time in 16 months, Chesterfield has a new Council on…

2 hours ago

This website uses cookies.