Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-11953 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Critical RCE in React Native CLI. The Metro Dev Server binds to external interfaces by default and has an OS command injection flaw in the `/open-url` endpoint.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-78 (OS Command Injection). The vulnerability stems from improper neutralization of special elements used in an OS command.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: `@react-native-community/cli-server-api`. πŸ“‰ **Versions**: `[4.8.0, 20.0.0)`. Any developer running these versions of the CLI server API is at risk.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Privileges**: The attacker gains the same privileges as the user running the React Native CLI. πŸ“‚ **Data**: Full read/write access to the developer's machine, source code, and environment variables.…

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: Extremely Low. 🚫 **Auth**: None required (Unauthenticated). 🌐 **Config**: Default configuration binds to external interfaces, making it accessible over the network without extra setup.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Exploitation**: Yes, Public PoCs exist. πŸ“‚ **Sources**: GitHub repos like `SaidBenaissa/cve-2025-11953-vulnerability-demo` and `B1ack4sh/Blackash-CVE-2025-11953` provide proof-of-concept exploits.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Check if `@react-native-community/cli-server-api` version is < 20.0.0. 2. Verify if the Metro Dev Server is bound to `0.0.0.0` (external) instead of `127.0.0.1` (localhost). 3.…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fix**: Yes, an official patch is available. πŸ“ **Commit**: `15089907d1f1301b22c72d7f68846a2ef20df547` in the React Native CLI repository. Update to the latest patched version immediately.

Q9What if no patch? (Workaround)

πŸ›‘ **Workaround**: If patching isn't possible, **disable external binding**. Configure the Metro Dev Server to bind strictly to `127.0.0.1` (localhost) so it is not accessible from external networks.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: CRITICAL. Priority: **IMMEDIATE**. CVSS 9.8 means it's easy to exploit and devastating. Patch now or isolate the development environment from untrusted networks.