Skip to main content
Mallory

Critical Vulnerabilities Exploited in 2025, Including React Native CLI Metro Dev Server RCE

actively-exploited-vulnerabilityrapid-weaponizationinternet-exposed-serviceopen-source-dependency-vulnerabilityinitial-access-method
Updated March 21, 2026 at 03:02 PM2 sources
Share:
Critical Vulnerabilities Exploited in 2025, Including React Native CLI Metro Dev Server RCE

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Attackers in 2025 rapidly exploited both new and longstanding vulnerabilities, with mass scanning and weaponization occurring within hours of disclosure. The most targeted weaknesses included deserialization flaws, memory corruption in edge devices, and privilege escalation bugs, with some vulnerabilities—such as those in React Server Components and Microsoft WSUS—being compared to Log4Shell in terms of scale and impact. The Top 25 exploited vulnerabilities of the year highlighted systemic failures in patch management and asset visibility, as attackers leveraged both recent and decade-old flaws to gain initial access, deploy webshells, and compromise CI/CD pipelines.

Among the most critical issues was CVE-2025-11953, a remote code execution vulnerability in the React Native Community CLI’s Metro development server. This flaw, caused by unsanitized user input in the @react-native-community/cli-server-api package, allowed unauthenticated attackers to execute arbitrary OS commands via exposed HTTP endpoints. The vulnerability posed significant supply chain risks to mobile app development environments, enabling attackers to compromise developer workstations, steal credentials, and potentially pivot into corporate networks. Multiple national CERTs and security vendors issued urgent alerts and mitigation guidance due to the high exploitability and widespread exposure of this vulnerability.

Timeline

  1. Dec 23, 2025

    2025 exploitation trends highlight industrialized vulnerability weaponization

    A year-end assessment reported that attackers in 2025 rapidly weaponized both new and longstanding vulnerabilities across enterprise software, edge devices, and critical infrastructure. The report highlighted widespread abuse of flaws in products such as React Server Components, Microsoft WSUS, Adobe Commerce, Citrix NetScaler, and Shellshock, often leading to webshells, credential theft, lateral movement, and ransomware.

  2. Dec 22, 2025

    Alerts and emergency protections issued for CVE-2025-11953

    Multiple CERTs and web application firewall vendors issued alerts and emergency protections in response to the high-risk React Native Metro server vulnerability. Recommended mitigation included upgrading to version 20.0.0 or later, restricting binding to localhost, and deploying network protections.

  3. Dec 22, 2025

    Critical RCE affects React Native CLI Metro server packages

    CVE-2025-11953 was identified as a critical unauthenticated remote code execution flaw in the @react-native-community/cli-server-api package affecting versions 4.8.0 through 20.0.0-alpha.2. The issue stems from OS command injection via unsanitized input handled by the open() function in the Metro development server.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Entities

Vulnerabilities

React2Shell (CVE-2025-55182)SSRF in Adminer (CVE-2021-21311)Command Injection in Ivanti Connect Secure and Policy Secure Web Components (CVE-2024-21887)CVE-2025-21421SessionReaper in Adobe Commerce and Magento Open Source REST API (CVE-2025-54236)Use-After-Free Privilege Escalation in Windows Common Log File System Driver (CVE-2025-32701)Type Confusion in Google Chrome V8 (CVE-2025-10585)Local Privilege Escalation in VMware Aria Operations and VMware Tools Service Discovery (CVE-2025-41244)Authentication Bypass and RCE in Gladinet Triofox (CVE-2025-12480)SSRF in Oracle E-Business Suite Oracle Configurator Runtime UI (CVE-2025-61884)Unauthenticated RCE in Fortinet FortiVoice, FortiMail, FortiNDR, FortiRecorder, and FortiCamera (CVE-2025-32756)Shellshock command injection in GNU Bash (CVE-2014-6278) (CVE-2014-6278)CitrixBleed 2 (CVE-2025-5777)Unauthenticated RCE in Windows Server Update Services (WSUS) via unsafe deserialization (CVE-2025-59287)Palo Alto PAN-OS GlobalProtect Command Injection RCE (CVE-2024-3400)Apache Tomcat Default Servlet Partial PUT Path Equivalence RCE (CVE-2025-24813)WatchGuard Fireware OS IKEv2 Out-of-Bounds Write RCE (CVE-2025-9242)Sitecore ViewState Deserialization RCE (CVE-2025-53690)Stored XSS in Zimbra Collaboration Classic Web Client via ICS files (CVE-2025-27915)Fortinet FortiWeb Relative Path Traversal Authentication Bypass (CVE-2025-64446)Memory Corruption in Siemens Teamcenter Visualization and Tecnomatix Plant Simulation WRL File Parser (CVE-2025-23397)Fortinet FortiOS/FortiProxy SSL VPN Out-of-Bounds Write RCE (CVE-2024-21762)Windows Cloud Files Mini Filter Driver Elevation of Privilege (CVE-2025-62221)Rejected duplicate of React2Shell in Next.js App Router (CVE-2025-66478)Unauthenticated OS Command Injection in Fortinet FortiSIEM phMonitor (CVE-2025-25256)Metro4Shell (CVE-2025-11953)Git submodule path CR handling leads to hook execution (CVE-2025-48384)

Threat Actors

Sources

December 23, 2025 at 12:00 AM

Related Stories

Critical Remote Code Execution Vulnerability in React Native CLI

Critical Remote Code Execution Vulnerability in React Native CLI

A critical vulnerability, tracked as CVE-2025-11953, was discovered in the `@react-native-community/cli` npm package, which is widely used for developing React Native mobile applications. The flaw, rated with a CVSS score of 9.8, allows unauthenticated remote attackers to execute arbitrary operating system commands on machines running the React Native CLI's development server. The vulnerability stems from the Metro development server binding to external interfaces by default and exposing an `/open-url` endpoint that is susceptible to OS command injection. Attackers can exploit this by sending specially crafted POST requests, leading to remote code execution. On Windows systems, attackers can execute arbitrary shell commands with full argument control, while on Linux and macOS, arbitrary binaries can be executed with limited parameter control. The issue affects versions 4.8.0 through 20.0.0-alpha.2 of the `@react-native-community/cli-server-api` package and has been patched in version 20.0.0. The vulnerability posed a significant risk to millions of developers, as the package receives up to 2 million downloads per week. The flaw has since been addressed, but organizations using affected versions are urged to update immediately to mitigate the risk of exploitation. The vulnerability was reported by JFrog researchers and publicly disclosed in early November 2025.

1 months ago
In-the-wild exploitation of React Native Metro4Shell (CVE-2025-11953) for remote code execution

In-the-wild exploitation of React Native Metro4Shell (CVE-2025-11953) for remote code execution

Threat actors have been observed exploiting **CVE-2025-11953** (aka **Metro4Shell**), a critical RCE flaw (CVSS **9.8**) in the React Native **Metro Development Server** exposed via the `@react-native-community/cli` / `@react-native-community/cli-server-api` npm packages. The issue stems from Metro’s development-only `/open-url` HTTP endpoint accepting attacker-controlled input that can be passed unsanitized to an `open()` call; under default configurations Metro may bind to external interfaces, making developer systems reachable from the internet. JFrog disclosed the vulnerability in November 2025, and multiple proof-of-concept exploits emerged after public disclosure; affected versions were reported as `@react-native-community/cli-server-api` **4.8.0 through 20.0.0-alpha.2**, with a fix in **20.0.0+**. VulnCheck telemetry and honeypot/canary observations indicate operational exploitation beginning **Dec 21, 2025**, with repeat activity on **Jan 4** and **Jan 21, 2026**, delivering consistent payloads rather than one-off probing. Observed attacks used **Base64-encoded PowerShell** delivered in HTTP POST bodies to exposed endpoints; the script added **Microsoft Defender** exclusions (including the current working directory and `C:\Users\<Username>\AppData\Local\Temp`), established a raw TCP connection to `8.218.43[.]248:60124`, downloaded an additional payload to the temp directory, and executed it. The downloaded binary was described as **Rust-based** with anti-analysis checks, and exploitation attempts were reported as originating from `5.109.182[.]231`, `223.6.249[.]141`, and `134.209.69[.]155`, underscoring the risk of internet-exposed development infrastructure being used as an initial access vector.

1 months ago
Critical Vulnerabilities and Exploitation Trends in 2025

Critical Vulnerabilities and Exploitation Trends in 2025

Security researchers highlighted several high-impact vulnerabilities that shaped the threat landscape in 2025, including unauthenticated remote code execution flaws in widely used platforms such as React Server Components (CVE-2025-55182), SAP NetWeaver (CVE-2025-31324), PAN-OS (CVE-2025-0108), Cisco IOS XE (CVE-2025-20188), and Erlang/OTP SSH (CVE-2025-32433). These vulnerabilities were notable for their rapid exploitation following public disclosure, with attackers leveraging unauthenticated access and broad software reach to maximize impact. The year saw a shift in attacker focus, with perimeter devices and enterprise software becoming primary entry points, and defenders were forced to respond quickly as the window between disclosure and exploitation narrowed. In December 2025, Microsoft released one of its lightest Patch Tuesday updates, addressing 56 new CVEs. Despite the lower volume, security experts emphasized the importance of prioritizing vulnerabilities that were already exploited, publicly disclosed, or rated as critical with a high likelihood of exploitation. The analysis provided actionable intelligence for defenders, including technology-specific threat insights and resources for mitigating risk. The convergence of these trends underscored the need for rapid vulnerability management and highlighted recurring blind spots in enterprise defense strategies.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.