Description

WhatsApp recently resolved a significant security vulnerability affecting its applications on both iOS and macOS platforms. The weakness, discovered as CVE-2025-55177, enabled attackers to remotely prompt content processing on an attacked device by sending malicious URL messages, without the victim's interaction. This "zero-click" vulnerability, which may have impacted fewer than 200 individuals, was linked to a broader exploit chain involving an Apple flaw identified as CVE-2025-43300. WhatsApp has acknowledged that it fixed the problem in patches issued between late July and early August 2025 for mobile and desktop versions. The attack vector seemed to use an advanced spyware assault that targeted carefully selected users like members of civil society, reporters, as well as human rights campaigners. The WhatsApp vulnerability arose from weak authorization verifications in relation to device sync messages, thus allowing attackers to use it silently. In combination with a memory corruption issue in Apple’s ImageIO framework, this enabled attackers to achieve remote code execution by delivering harmful images. Amnesty International Security Lab noted that these paired vulnerabilities were most probably exploited in very targeted attacks on surveillance that did not require any user interaction, aptly categorizing as per the term for a "zero-click" exploit. For risk mitigation, WhatsApp has asked users, especially those who have been notified that they are potentially targeted, to go through their device's entire factory reset as well as check that their WhatsApp application as well as their operating system is entirely current. Keeping software current is best practice to prevent exploitation due to known weaknesses. Although the origins of the spyware remain unknown, these events are illustrative of the state-backed surveillance software's ongoing threat as well as the importance of timely patch distribution.