Article Details
Scrape Timestamp (UTC): 2025-04-08 18:34:00.838
Source: https://www.theregister.com/2025/04/08/whatsapp_windows_bug/
Original Article Text
Click to Toggle View
Don't open that JPG sent via WhatsApp for Windows. It might be an .EXE. What a MIME field. A bug in WhatsApp for Windows can be exploited to execute malicious code by anyone crafty enough to persuade a user to open a rigged attachment - and, to be fair, it doesn't take much craft to pull that off. The spoofing flaw, tracked as CVE-2025-30401, affects all versions of WhatsApp Desktop for Windows prior to 2.2450.6, and stems from a bug in how the app handles file attachments. Specifically, WhatsApp displays attachments based on their MIME type - the metadata meant to indicate what kind of file it is - but when a user opens the file, the app hands it off based on its filename extension instead. That means something disguised as a harmless image with the right MIME type but ending in .exe could be executed as a program - if the user clicks it. "A maliciously crafted mismatch could have caused the recipient to inadvertently execute arbitrary code rather than view the attachment when manually opening the attachment inside WhatsApp," WhatsApp's parent company Meta explained in its security advisory. While WhatsApp is always an attractive target for miscreants, this particular bug does require user interaction – the victim has to manually open the malicious attachment for the payload to run. But this wouldn't be too hard, as many users are apt to click on anything - and even a savvy netizen may be inclined to open an attachment sent from, say, someone they didn't know but who belonged to their neighborhood watch WhatsApp group. A program run in this way may run into other defenses on your system, we note. Make sure you're running a version of WhatsApp for Windows higher than 2.2450.6 to be safe. "This is a particularly nasty vulnerability for the everyday user," Adam Brown, managing security consultant at Black Duck, said in an email to The Register about this vulnerability. "A malicious attachment could be used for data theft, running malware or spreading it, account and identity theft, or anything a nefarious actor chooses," Brown added. "Everyone should be careful when clicking on attachments, even from people they know, and Windows users of WhatsApp should be especially vigilant." Whether anyone's actually doing this in the wild remains unclear – the advisory doesn't say if the flaw is being exploited.
Daily Brief Summary
A vulnerability in WhatsApp for Windows allows execution of malicious code through rigged file attachments.
The flaw, identified as CVE-2025-30401, impacts versions prior to 2.2450.6 of the desktop application.
Attackers can mislabel executable files (.exe) as images (.jpg) by exploiting MIME type handling discrepancies.
Users must manually open the attachment for the malicious code to execute, making social engineering a potential risk factor.
WhatsApp's parent company, Meta, issued a security advisory encouraging users to update their app to avoid exploitation.
Security expert Adam Brown highlighted the risks of data theft, malware propagation, and identity theft due to this vulnerability.
The potential real-world exploitation of this bug remains unconfirmed as per the latest reports.