A spoofing issue in WhatsApp for Windows prior to version 2.2450.6 displayed attachments according to their MIME type but selected the file opening handler based on the attachment’s filename extension. A maliciously crafted mismatch could have caused the recipient to inadvertently execute arbitrary code rather than view the attachment when manually opening the attachment inside WhatsApp. We have not seen evidence of exploitation in the wild.
Metrics
Affected Vendors & Products
References
History
Wed, 09 Apr 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A spoofing issue in WhatsApp for Windows prior to version 2.2450.6 displayed attachments according to their MIME type but selected the file opening handler based on the attachment’s filename extension. A maliciously crafted mismatch could have caused the recipient to inadvertently execute arbitrary code rather than view the attachment when manually opening the attachment inside WhatsApp. | A spoofing issue in WhatsApp for Windows prior to version 2.2450.6 displayed attachments according to their MIME type but selected the file opening handler based on the attachment’s filename extension. A maliciously crafted mismatch could have caused the recipient to inadvertently execute arbitrary code rather than view the attachment when manually opening the attachment inside WhatsApp. We have not seen evidence of exploitation in the wild. |
References |
|
Tue, 08 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Whatsapp
Whatsapp whatsapp |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:windows:*:* | |
Vendors & Products |
Whatsapp
Whatsapp whatsapp |
Mon, 07 Apr 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Sat, 05 Apr 2025 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A spoofing issue in WhatsApp for Windows prior to version 2.2450.6 displayed attachments according to their MIME type but selected the file opening handler based on the attachment’s filename extension. A maliciously crafted mismatch could have caused the recipient to inadvertently execute arbitrary code rather than view the attachment when manually opening the attachment inside WhatsApp. | |
References |
|

Status: PUBLISHED
Assigner: facebook
Published:
Updated: 2025-04-09T17:19:56.351Z
Reserved: 2025-03-21T19:52:56.084Z
Link: CVE-2025-30401

Updated: 2025-04-07T14:35:58.302Z

Status : Modified
Published: 2025-04-05T12:15:14.540
Modified: 2025-04-09T18:15:45.107
Link: CVE-2025-30401

No data.