[CIVN-2026-0216] Multiple Vulnerabilities in WhatsApp

By Published On: May 6, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in WhatsApp


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: MEDIUM


Software Affected


WhatsApp for iOS versions v2.25.8.0 to v2.26.15.72

WhatsApp for Android versions v2.25.8.0 to v2.26.7.10

WhatsApp for Windows versions prior to v2.3000.1032164386.258709

Overview


Multiple vulnerabilities have been reported in WhatsApp which could allow an attacker to spoof file types, execute arbitrary code, and bypass security restrictions on the targeted system.

 

Target Audience:

End-users using affected version of WhatsApp.


Risk Assessment:

Risk of arbitrary code execution, full system compromise and unauthorized access.


Impact Assessment:

Exploitation could allow load and process malicious content from attacker-controlled URLs.


Description


WhatsApp is a widely used messaging application that enables users to send messages, voice notes, make calls, and share media over the internet.

Multiple vulnerabilities exist in WhatsApp due to improper handling of attachment filenames with embedded NUL bytes and incomplete validation of rich response messages containing external media URLs. An attacker could exploit these by sending specially crafted attachments.


Successful exploitation of these vulnerabilities could allow an attacker to spoof file types, execute arbitrary code, and bypass security restrictions on the targeted system.


Solution


Users are advised to update to the latest available versions of WhatsApp:

https://www.whatsapp.com/security/advisories/2026



Vendor Information


WhatsApp

https://www.whatsapp.com/security/advisories/2026


References


WhatsApp

https://www.whatsapp.com/security/advisories/2026


CVE Name

CVE-2026-23866

CVE-2026-23863




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmn7UOEACgkQ3jCgcSdc

ys+W0hAAhzbPBy14PwKwTcQBxpKo0TS/haitNjEuUXAZ2/V41oECRlIshry5sa++

bFkt/pffEl9RIaDTqMDML8jmJKULQNar4eyc4EF0DnSZX/nzacepqsKCspa2QexH

GsFR5dhcA0EZtjMepA3+T1eZqyrKqucgYl06MjoczNOM+jEFVEPEO8Lvznmzbcn3

I+lsyYuCWNLgV75Z5GrTeyj527Z6qmGmg760iJfzlx+BcDs+TpN1v4hHxaTeuPaz

puTvV2RORQvuEw3sWOhFtDLCD4PgMhzabvvfD35N7cLy8hBFhNuTDRNYwoe0oXBW

U0Nr1tmOvE/8PBMw+1X+def41Apgt/+VbqlZmG0RvqeEdawT/GW7siATUvHGOu/z

T1qnhU/F9Pq5Lx+9/RruemZ3Ey+6tjfqH2q2ahOo0ADp8se4D0SEa/ky5uASohQ7

znqw1ddyinS+yWlS1og4IJVjOGD9kDp7jPZp5T7lGrFU3Txo1xBAGBWlkIXO0exk

JjcIbjxNbs2YYDsV4GaAzrZc34uh8w7tWpskyRkvJH4goqR36JZCQAWEKdIY55uQ

Y0O+9MPh2gNzqrDAp94Dq8pNiy52A/RyY+EsSRePszm5tC6sNsXsGH7NPoaDFo5X

GfNVdPogYJ6S+dWd7X9WJLwzUtkpfIJP/bCFm0SYdKs9YyjfGYY=

=DMX1

—–END PGP SIGNATURE—–

Share this article