Back to Feed
VulnerabilitiesMay 5, 2026

WhatsApp Discloses File Spoofing, Arbitrary URL Scheme Vulnerabilities

WhatsApp patches file spoofing and arbitrary URL scheme vulnerabilities in Windows, iOS, Android.

Summary

Meta disclosed two medium-impact vulnerabilities in WhatsApp that were patched earlier in 2026. CVE-2026-23863 affects Windows versions and allows attackers to spoof file attachments as harmless files while executing as executables; CVE-2026-23866 affects iOS and Android, allowing arbitrary URL scheme handlers to be triggered via malicious Instagram Reels. Both flaws were responsibly disclosed through Meta's bug bounty program with no evidence of active exploitation.

Full text

Meta-owned WhatsApp has published two new security advisories describing vulnerabilities that were patched earlier this year in the popular messaging app. One of the vulnerabilities is CVE-2026-23863, a medium-impact attachment spoofing issue affecting WhatsApp for Windows prior to version 2.3000.1032164386.258709. An attacker could have exploited the flaw to create a maliciously formatted document with embedded NUL bytes in the file name. When sent as an attachment, the recipient would see it as a harmless file, but it would run as an executable when opened, WhatsApp’s advisory explains. The second vulnerability, CVE-2026-23866, has also been assigned a ‘medium impact’ rating. It affects WhatsApp for iOS (v2.25.8.0-v2.26.15.72) and WhatsApp for Android (v2.25.8.0-v2.26.7.10). According to WhatsApp, incomplete validation of AI rich response messages for Instagram Reels could have allowed an attacker to “trigger processing of media content from an arbitrary URL on another user’s device, including triggering OS-controlled custom URL scheme handlers.” WhatsApp has not shared additional information, but such custom URL scheme vulnerabilities in real-world attack scenarios may allow threat actors to redirect users to phishing sites, and launch other apps and services on the device via URL schemes such as facetime:, tel:, itms-apps:, or custom app deep links.Advertisement. Scroll to continue reading. WhatsApp said both vulnerabilities were responsibly disclosed by unnamed researchers through the Meta bug bounty program. The company says there is no evidence of exploitation in the wild. Related: $1M WhatsApp Hack Flops: Only Low-Risk Bugs Disclosed to Meta After Pwn2Own Withdrawal Related: Researcher Discovers 4th WhatsApp View Once Bypass; Meta Won’t Patch Related: Vulnerability Allowed Scraping of 3.5 Billion WhatsApp Accounts Related: WhatsApp Boosts Account Security for At-Risk Individuals Written By Eduard Kovacs Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering. More from Eduard Kovacs Trellix Source Code Repository BreachedCybersecurity M&A Roundup: 33 Deals Announced in April 2026OpenAI Rolls Out Advanced Security for ChatGPT AccountsGoogle Adjusts Bug Bounties: Chrome Payouts Drop as Android Rewards Rise Amid AI SurgeTwo US Security Experts Sentenced to Prison for Helping Ransomware GangCisco Releases Open Source Tool for AI Model Provenance FBI Warns of Surge in Hacker-Enabled Cargo TheftCritical Gemini CLI Flaw Enabled Host Code Execution, Supply Chain Attacks Latest News Palo Alto Networks to Patch Zero-Day Exploited to Hack FirewallsMicrosoft Warns of Sophisticated Phishing Campaign Targeting US OrganizationsHacker Conversations: Joey Melo on Hacking AICritical Bug Could Expose 300,000 Ollama Deployments to Information TheftCritical Remote Code Execution Vulnerability Patched in AndroidCritical, High-Severity Vulnerabilities Patched in Apache MINA, HTTP ServerKarakurt Ransomware Negotiator Sentenced to PrisonMetInfo, Weaver E-cology Vulnerabilities in Attackers’ Crosshairs Trending Daily Briefing Newsletter Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: ROSI for CPS Security Programs May 13, 2026 In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveJacki Monson has joined CVS Health as SVP, Deputy CISO.Gigi Schumm has been promoted to Chief Revenue Officer at Securonix.Chris Sistrunk has been promoted to Practice Leader for Mandiant's OT Security Consulting.More People On The MoveExpert Insights The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) The New Rules of Engagement: Matching Agentic Attack Speed The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael) Flipboard Reddit Whatsapp Whatsapp Email

Indicators of Compromise

  • cve — CVE-2026-23863
  • cve — CVE-2026-23866

Entities

Meta (vendor)WhatsApp (product)Instagram Reels (product)