CVE-2025-30401
WhatsApp vulnerability analysis and mitigation

Overview

A spoofing vulnerability (CVE-2025-30401) was discovered in WhatsApp for Windows versions prior to 2.2450.6. The vulnerability was disclosed on April 5, 2025, and affects the way WhatsApp handles file attachments. The issue was reported through Meta's bug bounty program and has been patched in version 2.2450.6 (NVD, SecurityWeek).

Technical details

The vulnerability stems from a mismatch between how WhatsApp displays attachments and how it handles their execution. The application displays attachments according to their MIME type but selects the file opening handler based on the attachment's filename extension. This discrepancy could allow attackers to craft malicious files that appear harmless but execute arbitrary code. The vulnerability has been assigned a CVSS v3.1 base score of 6.7 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L (Help Net Security).

Impact

If successfully exploited, the vulnerability could allow attackers to execute arbitrary code on the victim's system when the user manually opens a malicious attachment. The impact could include data theft, malware execution, account compromise, and identity theft. The attack requires user interaction, as the victim must manually open the malicious attachment for the payload to execute (The Register).

Mitigation and workarounds

Users are strongly advised to update their WhatsApp for Windows installation to version 2.2450.6 or later to address this vulnerability. This is the primary mitigation strategy recommended by Meta (Help Net Security).

Community reactions

Security researchers have characterized this as a particularly concerning vulnerability for everyday users. The security community has emphasized the importance of user vigilance when handling attachments, even from known contacts (The Register).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management