PT-2025-35227 · Meta · Whatsapp For Mac+2
Published
2025-08-29
·
Updated
2026-02-03
·
CVE-2025-55177
CVSS v2.0
5.5
5.5
Medium
| Base vector | Vector | AV:N/AC:L/Au:S/C:P/I:P/A:N |
Name of the Vulnerable Software and Affected Versions
WhatsApp versions prior to 2.25.21.73
WhatsApp Business versions prior to 2.25.21.78
WhatsApp for Mac versions prior to 2.25.21.78
Description
WhatsApp contains an authorization flaw due to incomplete authorization of linked device synchronization messages. This flaw could allow an unrelated user to trigger the processing of content from an arbitrary URL on a target’s device without any user interaction, referred to as a zero-click exploit. This vulnerability, combined with an Apple OS flaw, was exploited in targeted attacks, impacting fewer than 200 users, including journalists and human rights activists. The flaw allows attackers to send specially crafted messages that force the app to process malicious content from external sources. The vulnerability was actively exploited in attacks and is categorized as a zero-day.
Recommendations
Update WhatsApp to version 2.25.21.73 or later.
Update WhatsApp Business to version 2.25.21.78 or later.
Update WhatsApp for Mac to version 2.25.21.78 or later.
Fix
RCE
Incorrect Authorization
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2025-10994
CVE-2025-55177
Affected Products
Whatsapp Business For Ios
Whatsapp For Mac
Whatsapp For Ios
References · 218
- https://bdu.fstec.ru/vul/2025-10994 · Security Note
- https://facebook.com/security/advisories/cve-2025-55177 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-55177 · Security Note
- https://t.me/cveNotify/133965 · Telegram Post
- https://reddit.com/r/CVEWatch/comments/1nxq0qn/top_10_trending_cves_04102025 · Reddit Post
- https://reddit.com/r/CVEWatch/comments/1nyk9ym/top_10_trending_cves_05102025 · Reddit Post
- https://reddit.com/r/CVEWatch/comments/1n6fh7b/top_10_trending_cves_02092025 · Reddit Post
- https://twitter.com/dSecurityBENCH/status/1961602548046926316 · Twitter Post
- https://twitter.com/grok/status/2017364681711657284 · Twitter Post
- https://twitter.com/billmarczak/status/1961457322133524725 · Twitter Post
- https://twitter.com/grok/status/1973284142692679909 · Twitter Post
- https://t.me/true_secator/7379 · Telegram Post
- https://twitter.com/grok/status/2016138667803161043 · Twitter Post
- https://twitter.com/sirjameshackz/status/1962935013990695350 · Twitter Post
- https://unit42.paloaltonetworks.com/landfall-is-new-commercial-grade-android-spyware · Reddit Post