Wiz Agents & Workflows are here

CVE-2025-11953
JavaScript vulnerability analysis and mitigation

Overview

CVE-2025-11953 is a critical security vulnerability (CVSS 9.8) affecting the @react-native-community/cli NPM package, which has approximately 2 million weekly downloads. The vulnerability was discovered in November 2025 and affects versions 4.8.0 through 20.0.0-alpha.2 of the @react-native-community/cli-server-api package. The Metro Development Server, which is opened by the React Native Community CLI, binds to external interfaces by default and exposes an endpoint vulnerable to OS command injection (JFrog Blog, SecurityWeek).

Technical details

The vulnerability exists in the openURLMiddleware function within the packages/cli-server-api/src/openURLMiddleware.ts file. When the server receives a POST request to the /open-url endpoint, it processes a user-supplied URL parameter without proper sanitization and passes it directly to the open() function from the open NPM package. The CVSS score of 9.8 reflects the critical severity of this vulnerability, which is classified as CWE-78 (Improper Neutralization of Special Elements used in an OS Command) (JFrog Blog).

Impact

The vulnerability allows unauthenticated network attackers to execute arbitrary commands on the machine running the development server. On Windows systems, attackers can execute arbitrary shell commands with full parameter control. On macOS and Linux systems, the vulnerability enables execution of arbitrary executables with limited parameter control (JFrog Blog, Hacker News).

Mitigation and workarounds

Two primary mitigation options are available: 1) Update @react-native-community/cli-server-api to version 20.0.0 or higher, which includes the security fix, or 2) If updating is not possible, bind the development server explicitly to localhost by using the --host 127.0.0.1 flag when starting the server (e.g., npx react-native start --host 127.0.0.1). The fix implemented in version 20.0.0 adds strict URL validation to ensure only http and https protocols are allowed (JFrog Blog, GitHub Commit).

Community reactions

Meta's security team and engineers responded promptly to address the vulnerability. The security community has emphasized the significance of this vulnerability due to its critical severity and the widespread use of React Native in mobile application development (JFrog Blog).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-3hfp-gqgh-xc5gCRITICAL9.6
  • JavaScriptJavaScript
  • @lightdash/cli
NoYesApr 02, 2026
CVE-2026-34950CRITICAL9.1
  • JavaScriptJavaScript
  • fast-jwt
NoNoApr 02, 2026
CVE-2026-34752HIGH8.7
  • JavaScriptJavaScript
  • haraka
NoYesApr 02, 2026
CVE-2026-34825HIGH8.5
  • JavaScriptJavaScript
  • @nocobase/plugin-workflow-sql
NoYesApr 02, 2026
GHSA-ccgf-5rwj-j3hvLOW2.1
  • JavaScriptJavaScript
  • telejson
NoYesApr 02, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management