Overview
- A vulnerability in WhatsApp for Windows Desktop, identified as CVE-2025-30401, allowed attackers to execute arbitrary code via spoofed attachments.
- The flaw stemmed from a mismatch in how attachments were displayed based on MIME type but executed based on file extensions, creating potential for malicious code execution.
- Exploitation required user interaction, with attackers relying on victims to manually open maliciously crafted attachments.
- Meta has patched the issue in WhatsApp version 2.2450.6 following its discovery through the company's Bug Bounty program by an external researcher.
- Security experts emphasize the importance of updating to the latest version and caution against opening suspicious attachments, even from trusted contacts.