Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2025-11953
Analyzed
More InfoOfficial Page
Source-reefs@jfrog.com
View Known Exploited Vulnerability (KEV) details
Published At-03 Nov, 2025 | 17:15
Updated At-06 Feb, 2026 | 19:43

The Metro Development Server, which is opened by the React Native Community CLI, binds to external interfaces by default. The server exposes an endpoint that is vulnerable to OS command injection. This allows unauthenticated network attackers to send a POST request to the server and run arbitrary executables. On Windows, the attackers can also execute arbitrary shell commands with fully controlled arguments.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
2026-02-052026-02-26React Native Community CLI OS Command Injection VulnerabilityApply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Date Added: 2026-02-05
Due Date: 2026-02-26
Vulnerability Name: React Native Community CLI OS Command Injection Vulnerability
Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

react-native-community
react-native-community
>>react_native_community_cli>>Versions from 19.0.0(inclusive) to 19.1.2(exclusive)
cpe:2.3:a:react-native-community:react_native_community_cli:*:*:*:*:*:*:*:*
react-native-community
react-native-community
>>react_native_community_cli>>18.0.0
cpe:2.3:a:react-native-community:react_native_community_cli:18.0.0:*:*:*:*:*:*:*
react-native-community
react-native-community
>>react_native_community_cli>>20.0.0
cpe:2.3:a:react-native-community:react_native_community_cli:20.0.0:alpha0:*:*:*:*:*:*
react-native-community
react-native-community
>>react_native_community_cli>>20.0.0
cpe:2.3:a:react-native-community:react_native_community_cli:20.0.0:alpha1:*:*:*:*:*:*
react-native-community
react-native-community
>>react_native_community_cli>>20.0.0
cpe:2.3:a:react-native-community:react_native_community_cli:20.0.0:alpha2:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-78Secondaryreefs@jfrog.com
CWE ID: CWE-78
Type: Secondary
Source: reefs@jfrog.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/react-native-community/cli/commit/15089907d1f1301b22c72d7f68846a2ef20df547reefs@jfrog.com
Patch
https://jfrog.com/blog/cve-2025-11953-critical-react-native-community-cli-vulnerabilityreefs@jfrog.com
Exploit
Mitigation
Third Party Advisory
https://x.com/SzymonRybczak/status/1986199665000566848af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://x.com/thymikee/status/1986770875954475375af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-11953134c704f-9b21-4f2e-91b3-4a467353bcc0
US Government Resource
https://www.vulncheck.com/blog/metro4shell_eitw134c704f-9b21-4f2e-91b3-4a467353bcc0
Exploit
Third Party Advisory
Hyperlink: https://github.com/react-native-community/cli/commit/15089907d1f1301b22c72d7f68846a2ef20df547
Source: reefs@jfrog.com
Resource:
Patch
Hyperlink: https://jfrog.com/blog/cve-2025-11953-critical-react-native-community-cli-vulnerability
Source: reefs@jfrog.com
Resource:
Exploit
Mitigation
Third Party Advisory
Hyperlink: https://x.com/SzymonRybczak/status/1986199665000566848
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://x.com/thymikee/status/1986770875954475375
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-11953
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource:
US Government Resource
Hyperlink: https://www.vulncheck.com/blog/metro4shell_eitw
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource:
Exploit
Third Party Advisory
Change History
0Changes found

Details not found