Meta Patches WhatsApp for Windows Vulnerability That Enables Code Execution via File Spoofing

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses
Not the First Time WhatsApp Has Faced File Execution Risks
This is not the first time WhatsApp’s desktop version has allowed for unintended code execution. In July 2024, a similar issue enabled automatic execution of Python and PHP files when opened on machines where Python was installed, without alerting the user.
Part of a Larger Pattern of Targeted Attacks
WhatsApp continues to be a prime target for spyware campaigns:
In late 2024, a zero-click exploit was used to install Paragon’s Graphite spyware, affecting nearly 90 users across two dozen countries.
In a U.S. federal court ruling last year, Israeli spyware maker NSO Group was found to have exploited multiple WhatsApp zero-days to install Pegasus spyware on over 1,400 devices, violating U.S. hacking laws.
These incidents underscore WhatsApp’s attractiveness to threat actors deploying highly targeted surveillance tools.
Trending: Offensive Security Tool: CTFPacker
User Recommendations
Meta is strongly urging users to:
✅ Update WhatsApp for Windows to version 2.2450.6 or later
✅ Avoid opening unexpected file attachments, even from known contacts
✅ Verify file extensions manually, especially if the file type seems mismatched
✅ Use reputable endpoint protection, especially on devices used for communication and collaboration
Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]
Source: hackread.com