Preskoči na sadržaj
  • Početna
  • Aplikacije
    • PozivanjeDopisivanjeGrupeStatusKanaliMeta AISigurnost
  • Zaštita privatnosti
  • Centar za pomoć
  • Blog
  • Za poduzeća
Preuzmi
Uvjeti i pravila o privatnostiWhatsApp LLC 2025 ©
Glavna stranica WhatsAppaGlavna stranica WhatsAppa
    • Pozivi

      Ostanite u vezi uz glasovne i videopozive.

    • Dopisivanje

      Izrazite se naljepnicama, glasom, GIF-ovima i još mnogo toga.

    • Grupe

      Sve značajke za poruke koje su vam potrebne za povezivanje u grupama.

    • Kanali

      Primajte novosti o temama koje su vam važne.

    • Meta AI

      Pomoć za bilo što, uz sigurnost i privatnost WhatsAppa.

    • Status

      Dijelite svoju svakodnevicu kroz fotografije, videozapise i glasovne bilješke.

    • Sigurnost

      Slojevi zaštite za vašu sigurnost.

  • Privatnost
  • Centar za pomoć
  • Blog
  • Za poduzeća
  • Aplikacije
PrijavaPreuzmi

WhatsApp Security Advisories

2025 Updates

November Update

CVE-2025-55179

Incomplete validation of rich response messages in WhatsApp for iOS prior to v2.25.23.73, WhatsApp Business for iOS v2.25.23.82, and WhatsApp for Mac v2.25.23.83 could have allowed a user to trigger processing of media content from an arbitrary URL on another user’s device. We have not seen evidence of exploitation in the wild.

Acknowledgements: Internal Researchers at Meta


August Update

CVE-2025-55177

Incomplete authorization of linked device synchronization messages in WhatsApp for iOS prior to v2.25.21.73, WhatsApp Business for iOS v2.25.21.78, and WhatsApp for Mac v2.25.21.78 could have allowed an unrelated user to trigger processing of content from an arbitrary URL on a target’s device. We assess that this vulnerability, in combination with an OS-level vulnerability on Apple platforms (CVE-2025-43300), may have been exploited in a sophisticated attack against specific targeted users.

Acknowledgements: Internal Researchers on the WhatsApp Security Team


April Update

CVE-2025-30401

A spoofing issue in WhatsApp for Windows prior to version 2.2450.6 displayed attachments according to their MIME type but selected the file opening handler based on the attachment’s filename extension. A maliciously crafted mismatch could have caused the recipient to inadvertently execute arbitrary code rather than view the attachment when manually opening the attachment inside WhatsApp. We have not seen evidence of exploitation in the wild.

Acknowledgements: External Researcher via Meta Bug Bounty submission

Preuzmi
Glavni logotip za WhatsApp
Glavni logotip za WhatsApp
Preuzmi
Čime se bavimo
ZnačajkeBlogSigurnostZa poduzeća
Tko smo mi
O namaKarijereCentar robne markePrivatnost
Upotrijebite WhatsApp
AndroidiPhoneMac/računaloWhatsApp Web
Trebate pomoć?
Obratite nam seCentar za pomoćAplikacijeSavjeti za sigurnost
Preuzmi

WhatsApp LLC 2025 ©

Uvjeti i pravila o privatnostiKarta web-mjesta