Preskoči na vsebino
  • Domov
  • Aplikacije
    • KlicanjeSporočanjeSkupineStanjeKanaliMeta AIVarnost
  • Zasebnost
  • Help Center
  • Spletni dnevnik
  • Za podjetje
Prenos
pravilnik o uporabi in zasebnosti2025 © WhatsApp LLC
Glavna stran WhatsAppGlavna stran WhatsApp
    • Klicanje

      Ostanite povezani z glasom in videom.

    • Sporočanje

      Izrazite se z nalepkami, zvoki, GIF-i itn.

    • Skupine

      Funkcije za sporočanje, ki jih potrebujete za povezovanje v skupinah.

    • Kanali

      Bodite na tekočem z vsebinami, ki vas zanimajo.

    • Meta AI

      Poiščite pomoč pri vsem, ob tem pa uživajte v varnosti in zasebnosti v aplikaciji WhatsApp.

    • Stanje

      Delite svoj vsakdan s fotografijami, videi in glasovnimi sporočili.

    • Varnost

      Plasti zaščite, ki vam pomagajo ostati varni.

  • Zasebnost
  • Središče za pomoč
  • Spletni dnevnik
  • Za podjetje
  • Aplikacije
PrijavaPrenos

WhatsApp Security Advisories

2025 Updates

November Update

CVE-2025-55179

Incomplete validation of rich response messages in WhatsApp for iOS prior to v2.25.23.73, WhatsApp Business for iOS v2.25.23.82, and WhatsApp for Mac v2.25.23.83 could have allowed a user to trigger processing of media content from an arbitrary URL on another user’s device. We have not seen evidence of exploitation in the wild.

Acknowledgements: Internal Researchers at Meta


August Update

CVE-2025-55177

Incomplete authorization of linked device synchronization messages in WhatsApp for iOS prior to v2.25.21.73, WhatsApp Business for iOS v2.25.21.78, and WhatsApp for Mac v2.25.21.78 could have allowed an unrelated user to trigger processing of content from an arbitrary URL on a target’s device. We assess that this vulnerability, in combination with an OS-level vulnerability on Apple platforms (CVE-2025-43300), may have been exploited in a sophisticated attack against specific targeted users.

Acknowledgements: Internal Researchers on the WhatsApp Security Team


April Update

CVE-2025-30401

A spoofing issue in WhatsApp for Windows prior to version 2.2450.6 displayed attachments according to their MIME type but selected the file opening handler based on the attachment’s filename extension. A maliciously crafted mismatch could have caused the recipient to inadvertently execute arbitrary code rather than view the attachment when manually opening the attachment inside WhatsApp. We have not seen evidence of exploitation in the wild.

Acknowledgements: External Researcher via Meta Bug Bounty submission

Prenos
Glavni logotip družbe WhatsApp
Glavni logotip družbe WhatsApp
Prenos
Kaj počnemo
FunkcijeSpletni dnevnikVarnostZa podjetja
Kdo smo
VizitkaZaposlitevSredišče blagovne znamkeZasebnost
Uporabite WhatsApp
AndroidiPhoneMac/PCWhatsApp Web
Ali potrebujete pomoč?
Stik z namiSredišče za pomočAplikacijeVarnostne svetovalnice
Prenos

2025 © WhatsApp LLC

Pogoji in pravilnik o zasebnostiZemljevid mesta