Overslaan naar inhoud
  • Startpagina
  • Apps
    • BellenBerichtenGroepenStatusKanalenMeta AIBeveiliging
  • Privacy
  • Helpcentrum
  • Blog
  • Voor bedrijven
Downloaden
Voorwaarden en privacybeleid2026 © WhatsApp LLC
Hoofdpagina WhatsAppHoofdpagina WhatsApp
    • Bellen

      Blijf verbonden met spraak en video.

    • Berichten

      Zeg het met stickers, spraakberichten, GIF's en meer.

    • Groepen

      Berichtenfuncties die je nodig hebt om groepen te verbinden.

    • Kanalen

      Blijf op de hoogte van onderwerpen die je belangrijk vindt.

    • Meta AI

      Krijg bij alles hulp met de veiligheid en privacy op WhatsApp.

    • Status

      Deel je dag met foto's, video's en spraakberichten.

    • Beveiliging

      Beschermingslagen die je veilig houden.

  • Privacy
  • Helpcentrum
  • Blog
  • Voor bedrijven
  • Apps
AanmeldenDownloaden

WhatsApp Security Advisories

2025 Updates

November Update

CVE-2025-55179

Incomplete validation of rich response messages in WhatsApp for iOS prior to v2.25.23.73, WhatsApp Business for iOS v2.25.23.82, and WhatsApp for Mac v2.25.23.83 could have allowed a user to trigger processing of media content from an arbitrary URL on another user’s device. We have not seen evidence of exploitation in the wild.

Acknowledgements: Internal Researchers at Meta


August Update

CVE-2025-55177

Incomplete authorization of linked device synchronization messages in WhatsApp for iOS prior to v2.25.21.73, WhatsApp Business for iOS v2.25.21.78, and WhatsApp for Mac v2.25.21.78 could have allowed an unrelated user to trigger processing of content from an arbitrary URL on a target’s device. We assess that this vulnerability, in combination with an OS-level vulnerability on Apple platforms (CVE-2025-43300), may have been exploited in a sophisticated attack against specific targeted users.

Acknowledgements: Internal Researchers on the WhatsApp Security Team


April Update

CVE-2025-30401

A spoofing issue in WhatsApp for Windows prior to version 2.2450.6 displayed attachments according to their MIME type but selected the file opening handler based on the attachment’s filename extension. A maliciously crafted mismatch could have caused the recipient to inadvertently execute arbitrary code rather than view the attachment when manually opening the attachment inside WhatsApp. We have not seen evidence of exploitation in the wild.

Acknowledgements: External Researcher via Meta Bug Bounty submission

Downloaden
Hoofdlogo van WhatsApp
Hoofdlogo van WhatsApp
Downloaden

Wat we doen

FunctiesBlogBeveiligingVoor bedrijven

Wie we zijn

Over onsVacaturesMerkrichtlijnenPrivacy

WhatsApp gebruiken

AndroidiPhoneMac/pcWhatsApp Web

Hulp nodig?

Contact met ons opnemenHelpcentrumAppsBeveiligingsadviezen
Downloaden

2026 © WhatsApp LLC

Voorwaarden en privacybeleidSitemap