Description
The Metro Development Server, which is opened by the React Native Community CLI, binds to external interfaces by default. The server exposes an endpoint that is vulnerable to OS command injection. This allows unauthenticated network attackers to send a POST request to the server and run arbitrary executables. On Windows, the attackers can also execute arbitrary shell commands with fully controlled arguments.
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- network
- Complexity
- low
- Privileges
- none
- User Action
- none
- Scope
- unchanged
- Confidentiality
- high
- Integrity
- high
- Availability
- high
- Weaknesses
- CWE-78
Metadata
- Primary Vendor
- REACT-NATIVE-COMMUNITY
- Published
- 11/3/2025
- Last Modified
- 2/6/2026
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
react-native-community : react_native_community_clireact-native-community : react_native_community_clireact-native-community : react_native_community_clireact-native-community : react_native_community_cli
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.