Metro4Shell (CVE-2025-11953) is a critical remote code execution vulnerability affecting the Metro Development Server used by React Native during application development. The flaw has been actively exploited in the wild since December, primarily targeting developer workstations rather than production servers. Because Metro is commonly exposed during development and often runs with minimal security controls, attackers have leveraged this weakness to gain silent and persistent access to compromised systems. The vulnerability allows unauthenticated attackers to execute operating system commands remotely, making it highly attractive for initial access operations. The vulnerability stems from insecure default configurations and insufficient input validation within Metro’s exposed HTTP endpoints, most notably the handler. When Metro binds to non-loopback interfaces, remote attackers can send crafted requests that trigger command execution on the underlying operating system. This behavior effectively turns an exposed development server into an unauthenticated remote shell. Observed attacks show a clear post-exploitation pattern. On Windows systems, attackers commonly execute Base64-encoded PowerShell commands to download second-stage payloads, disable endpoint protection, and establish outbound command-and-control communications. On Linux and macOS, exploitation frequently results in shell command execution through Node.js child processes, followed by the retrieval of malicious binaries or scripts via curl or wget. Several payloads analyzed in the wild appear to be Rust-based malware with anti-analysis features, suggesting a moderate to high level of attacker sophistication. What makes Metro4Shell particularly dangerous is its operational context. Development environments are often overlooked in security monitoring, lack network segmentation, and contain sensitive source code, credentials, and signing keys. Exploitation does not require user interaction, authentication, or prior access, and scanning activity blends easily with legitimate development traffic. As a result, Metro4Shell represents a high-risk threat capable of enabling supply chain compromise, intellectual property theft, and lateral movement into enterprise environments if left unpatched or exposed.
Cybersecurity researchers recently identified a renewed phishing operation connected to the Tycoon 2FA Phishing as a Service platform, demonstrating how attackers are changing tact...
Apple’s latest M5 silicon, promoted as one of the most secure processor architectures ever developed for macOS, has reportedly been compromised in the first public kernel memory ...
A recently disclosed vulnerability in Android 16 has sparked privacy concerns after security researchers discovered that malicious applications can bypass VPN protections and expos...