Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55179: Incorrect Authorization (CWE-863) in Facebook WhatsApp Business for iOS

0
Medium
VulnerabilityCVE-2025-55179cvecve-2025-55179cwe-863
Published: Tue Nov 18 2025 (11/18/2025, 13:56:31 UTC)
Source: CVE Database V5
Vendor/Project: Facebook
Product: WhatsApp Business for iOS

Description

CVE-2025-55179 is a medium severity vulnerability in WhatsApp Business for iOS and related WhatsApp clients that allows incorrect authorization due to incomplete validation of rich response messages. This flaw could enable a user to cause another user’s device to process media content from an arbitrary URL without proper authorization. The vulnerability affects WhatsApp for iOS versions prior to 2. 25. 23. 73, WhatsApp Business for iOS v2. 25. 23. 82, and WhatsApp for Mac v2. 25.

AI-Powered Analysis

AILast updated: 11/25/2025, 14:27:26 UTC

Technical Analysis

CVE-2025-55179 is an authorization vulnerability classified under CWE-863, found in WhatsApp Business for iOS and related WhatsApp clients. The issue arises from incomplete validation of rich response messages, which are messages that can contain interactive or media content. Specifically, the vulnerability allows an attacker with low privileges (likely a contact or user with some access) to trigger the processing of media content hosted at arbitrary URLs on another user’s device without proper authorization checks. This could lead to unauthorized access or manipulation of media content, potentially compromising confidentiality and integrity of user data. The affected versions include WhatsApp for iOS prior to v2.25.23.73, WhatsApp Business for iOS v2.25.23.82, and WhatsApp for Mac v2.25.23.83, with the initially reported vulnerable version being 2.25.8.14. The vulnerability is remotely exploitable over the network without requiring user interaction, increasing its risk profile. However, no evidence of exploitation in the wild has been reported to date. The CVSS v3.1 score is 5.4 (medium severity), reflecting the moderate impact on confidentiality and integrity, ease of exploitation, and the lack of impact on availability. The flaw could be leveraged to cause a victim’s device to fetch and process malicious media content, potentially leading to further attacks or data leakage. Meta (Facebook) has published the vulnerability and assigned the CVE but has not yet provided explicit patch links, indicating that fixed versions are either recently released or forthcoming.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality and integrity of communications and media shared via WhatsApp Business on iOS devices. Unauthorized processing of media content could lead to exposure of sensitive business information or manipulation of media assets, which could be exploited for espionage, misinformation, or social engineering attacks. Organizations relying on WhatsApp Business for customer communication, especially in regulated sectors like finance, healthcare, or legal services, may face compliance risks if sensitive data is compromised. The vulnerability’s remote exploitability without user interaction increases the threat surface, particularly in environments where WhatsApp Business is widely used on iOS devices. Although availability is not impacted, the potential for unauthorized data access or manipulation could damage organizational reputation and trust. Given the lack of observed exploitation, the threat is currently theoretical but warrants proactive mitigation to prevent future attacks.

Mitigation Recommendations

European organizations should immediately verify the versions of WhatsApp Business for iOS and related WhatsApp clients deployed within their environment. Updating all affected clients to versions 2.25.23.73 or later for WhatsApp for iOS, 2.25.23.82 or later for WhatsApp Business for iOS, and 2.25.23.83 or later for WhatsApp for Mac is critical. In the absence of explicit patch links, organizations should monitor official Meta channels for updates and apply them promptly. Additionally, organizations should implement network monitoring to detect unusual outbound media requests or unexpected URL fetches initiated by WhatsApp clients. Employing endpoint detection and response (EDR) tools to monitor application behavior on iOS devices can help identify exploitation attempts. User education should emphasize caution when interacting with unsolicited or unexpected media messages, even though user interaction is not required for exploitation. Finally, organizations should review and enforce strict mobile device management (MDM) policies to control app versions and restrict installation of unapproved software.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Meta
Date Reserved
2025-08-08T18:21:47.119Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691c7c583fd37bbc3957664a

Added to database: 11/18/2025, 2:02:00 PM

Last enriched: 11/25/2025, 2:27:26 PM

Last updated: 1/7/2026, 4:52:53 AM

Views: 565

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats