CVE-2025-55179
BaseFortify
Publication date: 2025-11-18
Last updated on: 2025-11-25
Assigner: Facebook, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| From 2.25.8.14 (inc) to 2.25.23.83 (exc) | ||
| From 2.25.8.17 (inc) to 2.25.23.73 (exc) | ||
| whatsapp_business | From 2.25.8.14 (inc) to 2.25.23.82 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves incomplete validation of rich response messages in certain versions of WhatsApp for iOS and Mac. It could allow a user to cause another user's device to process media content from an arbitrary URL, potentially without proper authorization or user interaction.
How can this vulnerability impact me? :
The vulnerability could allow an attacker to trigger processing of media content from arbitrary URLs on a victim's device, which might lead to unauthorized information disclosure or manipulation of content. However, there is no evidence of exploitation in the wild.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update WhatsApp for iOS to version 2.25.23.73 or later, WhatsApp Business for iOS to version 2.25.23.82 or later, and WhatsApp for Mac to version 2.25.23.83 or later. These updates contain fixes for the incomplete validation of rich response messages that could allow processing of media content from arbitrary URLs.