Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsHackers Exploit Critical React Native Metro Bug to Breach Dev Systems
Hackers Exploit Critical React Native Metro Bug to Breach Dev Systems
Cybersecurity

Hackers Exploit Critical React Native Metro Bug to Breach Dev Systems

•February 3, 2026
0
BleepingComputer
BleepingComputer•Feb 3, 2026

Companies Mentioned

VulnCheck

VulnCheck

JFrog

JFrog

FROG

Microsoft

Microsoft

MSFT

ZoomEye

ZoomEye

Why It Matters

The bug provides a low‑effort, high‑impact entry point into developer environments, threatening code integrity and the broader mobile app supply chain. Immediate remediation is essential to prevent further compromise.

Key Takeaways

  • •CVE‑2025‑11953 allows unauthenticated command execution
  • •Exploits target /open‑url POST endpoint
  • •Over 3,500 Metro servers exposed online
  • •Fixed in Metro version 20.0.0+
  • •Attacks deliver cross‑platform PowerShell/Rust payloads

Pulse Analysis

React Native’s Metro bundler is the backbone of mobile app development, serving JavaScript bundles to emulators and devices during the build process. Because Metro runs a lightweight HTTP server by default, many developers leave it bound to external interfaces for convenience, unintentionally exposing the /open‑url endpoint to the internet. This exposure creates a soft target where attackers can inject malicious URLs, turning a development convenience into a remote code execution vector that bypasses traditional perimeter defenses.

The CVE‑2025‑11953 flaw leverages the unsanitized handling of POST data in the /open‑url route, allowing an attacker to invoke the system’s open() function with arbitrary arguments. On Windows, the exploit drops a Base‑64‑encoded PowerShell payload that disables Defender, contacts a command‑and‑control server, and runs a packed Rust binary. Linux and macOS victims receive analogous executables with limited parameter control. The cross‑platform nature of Metro4Shell means a single exploit chain can compromise heterogeneous development labs, potentially stealing source code, injecting malicious libraries, or pivoting into production environments.

Mitigation requires a two‑pronged approach: patch Metro to version 20.0.0 or later and reconfigure the bundler to bind only to localhost or use VPN‑restricted access. Organizations should also audit network exposure, rotate credentials, and monitor for the specific IoCs disclosed by VulnCheck. This incident underscores the growing risk of supply‑chain attacks originating from development tooling, prompting security teams to treat dev servers with the same rigor as production assets. Early detection and swift remediation are now critical to safeguard the mobile app ecosystem.

Hackers exploit critical React Native Metro bug to breach dev systems

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...