
[CIVN-2026-0073] Remote Code Execution Vulnerability in React Native Metro Server
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Remote Code Execution Vulnerability in React Native Metro Server
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Software Affected
@react-native-community/cli(npm) versions prior to 18.0.1, 19.1.2 and 20.0.0
@react-native-community/cli-server(npm) versions prior to 18.0.1, 19.1.2 and 20.0.0
Overview
A vulnerability has been reported in React Native Metro Server, which may allow an unauthenticated attacker to execute arbitrary executable and shell commands on the targeted system.
Target Audience:
All end-user organizations and individuals using the affected React Native development on Windows installations.
Risk Assessment:
High risk of full system compromise, privilege escalation, and persistence.
Impact Assessment:
Potential for arbitrary execution of executable or OS commands, sensitive information disclosure, and deployment of malware.
Description
The vulnerability exists in the React Native Community CLI due to insecure default binding to external network interfaces and insufficient input validation in Metro Development Server. An attacker could exploit this vulnerability by sending specially crafted POST request to the exposed server endpoint over the network.
Successful exploitation could allow an unauthenticated attacker to execute arbitrary executable and shell commands on the targeted system.
Solution
https://github.com/advisories/GHSA-399j-vxmf-hjvr
Vendor Information
React Native
https://github.com/react-native-community/cli/
References
https://github.com/advisories/GHSA-399j-vxmf-hjvr
CVE Name
CVE-2025-11953
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmHIGYACgkQ3jCgcSdc
ys8Kkw//eCi8HZxEF6aZhThX4OWfSZLzivKlRGP+6DZaV7KCrktbZ+lnEBtYMX4S
O8NgKwmifsHn8qAxCn9Gjt6vZKk3rbocTcpg8Oxt/4k2I/Je5UPfU9ucI+ym/thS
RMEAszqU5V10+WQyTaHMN0dfaAHwHXnp6P6dwYNSwA7/aDwSH1n84FbKlLwncuw4
x2/Cdxub4bAjAXwEyRYI4ywaakTk29sW9YTZDy0XxnPpo8+3lm8EbFBObQ0RbEiq
R81ZgpOoBRd21/fFYLaRK4cEYwHYM71jynatlfTqTM87sd8BgFeC3y/KvTcQV7ab
DXrfiVX6eY2p6vgWp1FnRCieKY7ag1BhsmDQlgSy40ob3UXVaye8AAcV33BNIWhP
tU4nEXoDhfblpeKOckFWMwNkt9H2QJ5EnFS2mpFRlMRlThaX86XW1vX8FbfdbHXZ
ipjED55WzkD2nhOcHLo7gqitBOkiXSJcRDv57oPopIHI3n4DnrpVkCH0TOR8RBps
Oi7PHI4tuNhAj34opIEas7ghiDTmmOV96CIMiXwNdXgtlgJcthfPz97JCOODynyi
SHy3XOWrJwQO03cfRjCQRhRr/HEHzd2348QjjeG5vdKc9qM9Vpl6/ZXL24aZCDBN
SdPG4PKUE4vZmtjF/aGZdf4nXyGaf7Uwhn5Qz6aOSDCFK6XclUg=
=c6+2
—–END PGP SIGNATURE—–


