Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55177: Incorrect Authorization (CWE-863) in Facebook WhatsApp Desktop for Mac

0
Medium
VulnerabilityCVE-2025-55177cvecve-2025-55177cwe-863
Published: Fri Aug 29 2025 (08/29/2025, 15:50:28 UTC)
Source: CVE Database V5
Vendor/Project: Facebook
Product: WhatsApp Desktop for Mac

Description

Incomplete authorization of linked device synchronization messages in WhatsApp for iOS prior to v2.25.21.73, WhatsApp Business for iOS v2.25.21.78, and WhatsApp for Mac v2.25.21.78 could have allowed an unrelated user to trigger processing of content from an arbitrary URL on a target’s device. We assess that this vulnerability, in combination with an OS-level vulnerability on Apple platforms (CVE-2025-43300), may have been exploited in a sophisticated attack against specific targeted users.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 03:48:17 UTC

Technical Analysis

CVE-2025-55177 is an authorization vulnerability classified under CWE-863 affecting WhatsApp Desktop for Mac and WhatsApp for iOS platforms. The flaw arises from incomplete authorization checks on linked device synchronization messages, which are used to sync content between a user's mobile device and desktop client. Specifically, an unrelated user could exploit this weakness to cause the target device to process content from an arbitrary URL without proper validation or permission. This could lead to unauthorized disclosure or modification of data, undermining confidentiality and integrity. The vulnerability requires network access and low privileges (PR:L) but does not require user interaction, making it easier to exploit in controlled environments. The CVSS v3.1 score is 5.4 (medium), reflecting moderate impact and exploitability. Importantly, this vulnerability may be chained with an Apple OS-level vulnerability (CVE-2025-43300) to facilitate more advanced attacks against specific targets, indicating a potential for sophisticated threat actor exploitation. The affected WhatsApp versions include iOS versions prior to 2.25.21.73 and Mac version 2.25.21.78. No public exploit code or widespread exploitation has been reported, but the vulnerability's presence in a widely used messaging platform raises concerns for privacy and security of communications.

Potential Impact

The primary impact of CVE-2025-55177 is unauthorized processing of arbitrary content on targeted devices, which can lead to leakage or manipulation of sensitive information within WhatsApp communications. This undermines user confidentiality and data integrity. Although availability is not affected, the ability to process arbitrary URLs could be leveraged to deliver malicious payloads or facilitate further exploitation, especially when combined with the Apple OS-level vulnerability CVE-2025-43300. Organizations relying on WhatsApp for sensitive communications, especially in regulated industries or those with high-value targets, face risks of targeted espionage or data compromise. The vulnerability's exploitation could also erode user trust in the platform and lead to reputational damage. Since the flaw affects both consumer and business versions of WhatsApp on iOS and Mac, a broad range of users and organizations worldwide are potentially impacted. The lack of known exploits in the wild suggests limited immediate risk, but the possibility of sophisticated targeted attacks necessitates proactive mitigation.

Mitigation Recommendations

To mitigate CVE-2025-55177, organizations and users should immediately update WhatsApp for iOS to version 2.25.21.73 or later, WhatsApp Business for iOS to 2.25.21.78 or later, and WhatsApp Desktop for Mac to 2.25.21.78 or later once patches are available. Until patches are applied, restrict network access to WhatsApp synchronization services where feasible and monitor for unusual synchronization activity or unexpected URL processing events. Employ endpoint detection and response (EDR) tools to detect anomalous behavior related to linked device synchronization. Additionally, ensure Apple devices are updated with the latest OS security patches to mitigate the chained OS-level vulnerability (CVE-2025-43300). Organizations should educate users about the risks of unauthorized device linking and enforce strict device management policies. Network segmentation and application whitelisting can further reduce exposure. Finally, maintain vigilant threat intelligence monitoring for any emerging exploit attempts targeting this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
facebook
Date Reserved
2025-08-08T18:21:47.118Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b1cf29ad5a09ad00794384

Added to database: 8/29/2025, 4:02:49 PM

Last enriched: 2/27/2026, 3:48:17 AM

Last updated: 3/23/2026, 4:53:39 PM

Views: 320

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses