An attachment spoofing issue in WhatsApp for Windows prior to v2.3000.1032164386.258709 could have allowed maliciously formatted documents with embedded NUL bytes in the filename to be shown in the application as one type of file but run as an executable when opened. We have not seen evidence of exploitation in the wild.

Project Subscriptions

Vendors Products
Whatsapp Subscribe
Whatsapp Subscribe
Whatsapp Desktop Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 11 May 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Whatsapp whatsapp
CPEs cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:windows:*:*
Vendors & Products Whatsapp whatsapp

Mon, 04 May 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Whatsapp
Whatsapp whatsapp Desktop
Vendors & Products Whatsapp
Whatsapp whatsapp Desktop

Fri, 01 May 2026 23:15:00 +0000

Type Values Removed Values Added
Title WhatsApp Windows Filename Spoofing Leading to Potential Execution of Malicious Payload

Fri, 01 May 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-158
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 01 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description An attachment spoofing issue in WhatsApp for Windows prior to v2.3000.1032164386.258709 could have allowed maliciously formatted documents with embedded NUL bytes in the filename to be shown in the application as one type of file but run as an executable when opened. An attachment spoofing issue in WhatsApp for Windows prior to v2.3000.1032164386.258709 could have allowed maliciously formatted documents with embedded NUL bytes in the filename to be shown in the application as one type of file but run as an executable when opened. We have not seen evidence of exploitation in the wild.
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C'}


Fri, 01 May 2026 16:15:00 +0000

Type Values Removed Values Added
Description An attachment spoofing issue in WhatsApp for Windows prior to v2.3000.1032164386.258709 could have allowed maliciously formatted documents with embedded NUL bytes in the filename to be shown in the application as one type of file but run as an executable when opened.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Meta

Published:

Updated: 2026-05-01T17:41:14.681Z

Reserved: 2026-01-16T19:49:26.308Z

Link: CVE-2026-23863

cve-icon Vulnrichment

Updated: 2026-05-01T17:41:10.404Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-01T16:16:29.843

Modified: 2026-05-11T19:59:52.623

Link: CVE-2026-23863

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T16:07:31Z

Weaknesses