Security researchers at VulnCheck have confirmed active exploitation of CVE-2025-11953, a critical command injection vulnerability in React Native’s Metro Development Server. Dubbed Metro4Shell, the flaw allows unauthenticated remote code execution and has been exploited since December 2025 to deploy Rust-based malware on developer systems.

Vulnerability overview

AttributeDetails
CVECVE-2025-11953
NameMetro4Shell
CVSS score9.8 (Critical)
Affected package@react-native-community/cli
Weekly downloads~2 million
Affected versions4.8.0 - 20.0.0-alpha.2
Fixed version20.0.0
DiscoveryVulnCheck

Timeline

DateEvent
Early November 2025CVE-2025-11953 disclosed
December 21, 2025VulnCheck observes first exploitation
January 4, 2026Additional exploitation observed
January 21, 2026Continued exploitation confirmed
February 4, 2026VulnCheck publishes exploitation details

Technical details

Root cause

The Metro Development Server, used during React Native development, contains a command injection flaw in the /open-url endpoint.

ComponentIssue
Endpoint/open-url
Parameterurl
FlawInsufficient input validation
ImpactArbitrary command execution

Exploitation mechanism

PlatformCapability
WindowsExecute arbitrary programs + shell commands with controlled arguments
Linux/macOSExecute arbitrary programs

The Metro server binds to external interfaces by default, allowing unauthenticated attackers to send malicious POST requests.

Attack request example

ElementDescription
MethodPOST
Endpoint/open-url
Parameterurl containing malicious payload
ResultCommand execution on developer machine

Exploitation in the wild

VulnCheck observations

DateActivity
December 21, 2025First recorded exploitation on VulnCheck Canary network
January 4, 2026Same payloads delivered
January 21, 2026Continued operational use

VulnCheck characterized the activity:

“The delivered payloads were consistent across multiple weeks of exploitation, indicating operational use rather than vulnerability probing or proof-of-concept testing.”

Attack sophistication

IndicatorAssessment
Payload consistencyOperational, not experimental
Multi-week durationSustained campaign
Cross-platform targetingWindows and Linux payloads
Malware sophisticationCustom Rust-based implant

Attack chain

Stage 1: Initial exploitation

StepAction
1Scan for exposed Metro Development Servers
2Send POST request to /open-url endpoint
3Trigger command execution via malicious URL parameter

Stage 2: Payload delivery (Windows)

StepAction
1cmd.exe executes with base64-encoded PowerShell payload
2PowerShell adds Windows Defender exclusions
3Exclusions cover current directory and %TEMP%
4Second-stage payload downloaded
5Rust-based malware executed

Stage 3: Malware deployment

AttributeDetails
LanguageRust
Anti-analysisBasic evasion logic
PersistenceUnder investigation
TargetsWindows and Linux systems

The awareness gap

Despite active exploitation since December 2025, the vulnerability has received limited attention:

MetricStatus
EPSS probability0.00405 (low)
Public acknowledgmentLimited
Security community awarenessLow
Time since first exploitation6+ weeks

VulnCheck noted:

“This gap between observed exploitation and wider recognition matters, particularly for vulnerabilities that are easy to exploit and exposed on the public internet.”

Why developers are targets

High-value access

AssetValue to attackers
Source codeIntellectual property theft
CredentialsAPI keys, tokens, secrets
CI/CD accessSupply chain compromise
Corporate networkLateral movement
Signing keysMalicious package distribution

Development environment risks

Risk factorImpact
Elevated privilegesDevelopers often have admin access
Network exposureDev servers accessible from network
Security tooling gapsEDR may exclude dev tools
Trust assumptionsInternal tools assumed safe

Detection

Network indicators

IndicatorDetection method
POST requests to Metro serverWeb server logs
/open-url endpoint accessRequest logging
Unusual outbound connectionsNetwork monitoring
PowerShell executionProcess monitoring

Host indicators

IndicatorDetection method
Defender exclusion additionsWindows Security logs
Rust binary executionProcess monitoring
cmd.exe with base64 argumentsCommand-line logging
Unusual %TEMP% activityFile system monitoring

Remediation

Immediate actions

PriorityAction
CriticalUpdate @react-native-community/cli to 20.0.0+
CriticalEnsure Metro servers not internet-exposed
HighReview logs for exploitation indicators
HighScan for compromise if exposed during window

Configuration hardening

ControlImplementation
Network bindingConfigure Metro to bind localhost only
Firewall rulesBlock external access to development ports
Network segmentationIsolate dev environments
VPN requirementRequire VPN for remote development

Verification

CheckCommand/Location
Package versionnpm list @react-native-community/cli
Metro bindingCheck metro.config.js for host settings
Network exposure`netstat -an

Recommendations

For development teams

PriorityAction
CriticalUpgrade React Native CLI immediately
HighAudit network exposure of dev tools
HighImplement network segmentation
MediumEnable enhanced logging for dev environments
OngoingMonitor for suspicious development tool activity

For security teams

PriorityAction
CriticalInventory React Native development environments
HighThreat hunt for Metro4Shell exploitation
HighAdd detection rules for attack indicators
MediumReview developer machine security policies
OngoingInclude dev tools in vulnerability management

For organizations

PriorityAction
HighEstablish dev environment security standards
HighInclude dev tools in asset inventory
MediumSecurity training for developers
OngoingRegular assessment of development security

Context

Metro4Shell highlights the increasing targeting of developer environments and tools by threat actors. Developers represent high-value targets due to their access to source code, credentials, CI/CD pipelines, and signing keys.

The vulnerability’s characteristics make it particularly dangerous:

  • High severity (CVSS 9.8)
  • Easy to exploit (single POST request)
  • Wide exposure (2 million weekly downloads)
  • Low awareness (limited public acknowledgment)
  • Active exploitation (operational attacks observed)

The gap between exploitation start (December 2025) and broader security community awareness demonstrates that traditional vulnerability prioritization metrics (like EPSS) may not reflect actual risk for developer-focused vulnerabilities.

Organizations should treat development environments as critical infrastructure and apply the same security rigor used for production systems. The days of assuming internal development tools are safe from external attack are over.