Gå videre til indholdet
  • Startside
  • Apps
    • OpkaldBeskederGrupperStatusKanalerMeta AISikkerhed
  • Privatindstillinger
  • Hjælp
  • Blog
  • Til virksomheder
Download
Vilkår og politik om beskyttelse af personoplysninger2025 © WhatsApp LLC
WhatsApp-startsideWhatsApp-startside
    • Opkald

      Hold kontakten med tale og video.

    • Beskeder

      Sig det med klistermærker, din stemme, GIF'er og meget mere.

    • Grupper

      Beskedfunktioner, du skal bruge for at få kontakt i grupper.

    • Kanaler

      Hold dig opdateret om emner, du interesserer dig for.

    • Meta AI

      Få hjælp til hvad som helst – alt sammen trygt, sikkert og med beskyttelse af personoplysninger på WhatsApp.

    • Status

      Del din hverdag med billeder, videoer og talenoter.

    • Sikkerhed

      Lag af beskyttelse for at hjælpe dig med at holde dig sikker.

  • Privatindstillinger
  • Hjælp
  • Blog
  • Til virksomheder
  • Apps
Log påDownload

WhatsApp Security Advisories

2025 Updates

November Update

CVE-2025-55179

Incomplete validation of rich response messages in WhatsApp for iOS prior to v2.25.23.73, WhatsApp Business for iOS v2.25.23.82, and WhatsApp for Mac v2.25.23.83 could have allowed a user to trigger processing of media content from an arbitrary URL on another user’s device. We have not seen evidence of exploitation in the wild.

Acknowledgements: Internal Researchers at Meta


August Update

CVE-2025-55177

Incomplete authorization of linked device synchronization messages in WhatsApp for iOS prior to v2.25.21.73, WhatsApp Business for iOS v2.25.21.78, and WhatsApp for Mac v2.25.21.78 could have allowed an unrelated user to trigger processing of content from an arbitrary URL on a target’s device. We assess that this vulnerability, in combination with an OS-level vulnerability on Apple platforms (CVE-2025-43300), may have been exploited in a sophisticated attack against specific targeted users.

Acknowledgements: Internal Researchers on the WhatsApp Security Team


April Update

CVE-2025-30401

A spoofing issue in WhatsApp for Windows prior to version 2.2450.6 displayed attachments according to their MIME type but selected the file opening handler based on the attachment’s filename extension. A maliciously crafted mismatch could have caused the recipient to inadvertently execute arbitrary code rather than view the attachment when manually opening the attachment inside WhatsApp. We have not seen evidence of exploitation in the wild.

Acknowledgements: External Researcher via Meta Bug Bounty submission

Download
Primært WhatsApp-logo
Primært WhatsApp-logo
Download
Hvad gør vi?
FunktionerBlogSikkerhedTil virksomheder
Hvem er vi?
Om osKarriererBrandcenterPrivatindstillinger
Brug WhatsApp
AndroidiPhoneMac/pcWhatsApp Web
Har du brug for hjælp?
Kontakt osHjælpAppsSikkerhedsrådgivere
Download

2025 © WhatsApp LLC

Vilkår og politik om beskyttelse af personoplysningerSitemap