Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Critical React Native Vulnerability Exploited in the Wild
    Cybersecurity

    Critical React Native Vulnerability Exploited in the Wild

    adminBy adminFebruary 4, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    React vulnerability exploited
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Threat actors have been exploiting a critical-severity React Native vulnerability in attacks since late December, VulnCheck warns.

    Tracked as CVE-2025-11953 (CVSS score of 9.8) and disclosed in early November, the bug impacts the highly popular React Native Community CLI NPM package (@react-native-community/cli), which has roughly two million weekly downloads.

    It is part of the React Native Community CLI project, which was extracted from the open source framework for improved maintainability, and provides a set of command-line tools for app building.

    While CVE-2025-11953 and other vulnerabilities impacting development servers are typically exploitable only from the developer’s local machine, a second issue in React Native exposes the servers to external attackers, software supply chain security firm JFrog warned in November.

    Now, VulnCheck mirrors the warning after observing in-the-wild exploitation of the CVE, despite limited public attention.

    “As of late January, public discussion largely frames CVE-2025-11953 as a theoretical risk rather than an active intrusion vector. This disconnect is where defenders are most likely to be caught unprepared,” VulnCheck notes in a fresh report.

    Advertisement. Scroll to continue reading.

    The vulnerability intelligence firm, which has named the bug Metro4Shell, observed initial exploitation attempts on December 21, followed by more activity on January 4 and 21, suggesting continuous operational use. Thousands of internet-accessible React Native instances could be at risk.

    “This gap between observed exploitation and wider recognition matters, particularly for vulnerabilities that are easy to exploit and, as internet-wide search data shows, exposed on the public internet,” VulnCheck says.

    According to the company, the Metro4Shell React Native vulnerability resides within Metro, the JavaScript bundler and development server that React Native apps use in the development and testing stages.

    By default, Metro can bind to external interfaces, exposing deployments to unauthenticated, remote OS command execution via simple POST requests.

    VulnCheck observed the attackers deploying a multi-stage PowerShell-based loader designed to disable Microsoft Defender protections, establish a raw TCP connection to the attackers’ host, send a GET request and receive a payload, and execute the downloaded payload.

    “This same methodology was observed across multiple attacks. The deliberate disabling of Microsoft Defender protections before payload retrieval indicates the attacker anticipated the presence of endpoint security controls and incorporated evasion measures into the initial execution flow,” VulnCheck notes.

    The final payload is written in Rust and has a basic anti-analysis logic. VulnCheck has observed payloads targeting both Windows and Linux systems.

    “CVE-2025-11953 is not remarkable because it exists. It is remarkable because it reinforces a pattern defenders continue to relearn. Development infrastructure becomes production infrastructure the moment it is reachable, regardless of intent,” VulnCheck notes.

    Related: RondoDox Botnet Exploiting React2Shell Vulnerability

    Related: Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery

    Related: Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack

    Related: Cyber Insights 2026: Malware and Cyberattacks in the Age of AI

    Critical Exploited Native React vulnerability Wild
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleI can’t live without these 5 VLC plugins
    Next Article Guardian angel tech from Hyundai and Kia aims to end school zone tragedies
    admin
    • Website

    Related Posts

    Fake Google Security site uses PWA app to steal credentials, MFA codes

    March 2, 2026

    Vulnerability Allowed Hijacking Chrome’s Gemini Live AI Assistant

    March 2, 2026

    New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

    March 2, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Why I’m sticking with 7B models for my local dev environment (and you should too)

    March 2, 2026

    Fake Google Security site uses PWA app to steal credentials, MFA codes

    March 2, 2026

    AI marketing predictions that will shape 2026

    March 2, 2026

    Google Pixel’s Now Playing feature rolls out as an app, and boy does it look good

    March 2, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (563)
    • Privacy & Online Earning (76)
    • SEO & Digital Marketing (351)
    • Tech Tools & Mobile / Apps (700)
    • WiFi / Internet & Networking (101)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Why I’m sticking with 7B models for my local dev environment (and you should too)

    March 2, 2026

    Fake Google Security site uses PWA app to steal credentials, MFA codes

    March 2, 2026

    AI marketing predictions that will shape 2026

    March 2, 2026
    Most Popular
    • Why I’m sticking with 7B models for my local dev environment (and you should too)
    • Fake Google Security site uses PWA app to steal credentials, MFA codes
    • AI marketing predictions that will shape 2026
    • Google Pixel’s Now Playing feature rolls out as an app, and boy does it look good
    • Vulnerability Allowed Hijacking Chrome’s Gemini Live AI Assistant
    • Want Better Google Ads Insights? Try These 6 Reports
    • Pixel’s Now Playing feature has officially rolled out as an app
    • Don’t Post Travel Updates in Real Time
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.