WhatsApp Bug Could Have Allowed Attackers to Remotely Access Files on Your Desktop

The WhatsApp vulnerability has been tracked as CVE-2019-18426.

Advertisement
By Jagmeet Singh | Updated: 5 February 2020 11:17 IST
Highlights
  • WhatsApp desktop application vulnerability is classed as “high”
  • It impacted WhatsApp Web client to some extent as well
  • WhatsApp users are recommended to install the latest desktop version

WhatsApp desktop application versions prior to 0.3.9309 are affected by the newly reported vulnerability

WhatsApp has been discovered to have a critical vulnerability that could have allowed attackers to remotely access files from a Windows or Mac computer. The vulnerability, which has been fixed by Facebook, could be exploited using the WhatsApp desktop application. It was a mix of multiple high-severity flaws that existed within the WhatsApp desktop application. Some of those flaws were also a part of the WhatsApp Web client that works on Web browsers. The vulnerability essentially allowed for cross-site scripting (XSS) that could be used by remote attackers.

PerimeterX researcher Gal Weizman discovered the WhatsApp vulnerability that has been tracked as CVE-2019-18426. The researcher stated that the security loophole existed within the Content Security Policy (CSP) of WhatsApp that allowed for XSS attacks on the desktop app. The flaw in the CSP also impacted the WhatsApp Web client to some extent as it provided space to alter rich preview banners with malicious content.

Advertisement

The researcher in a blog post mentioned that the Web client was vulnerable to an open-redirect flaw that could have led to persistent cross-site scripting attacks triggered by sending specially crafted messages to WhatsApp users.

However, the scope of the loophole is found to be quite wider on the WhatsApp desktop application over what was discovered on its Web client. The researcher found that he was able to read the file system and identify the remote code execution (RCE) potential on the desktop application. The only thing that the affected WhatsApp users had to do was to click on the specially crafted message to provide backdoor access to attackers.

Advertisement

"For some reason, the CSP rules were not an issue with the Electron based app, so fetching an external payload using a simple JavaScript resource worked," Weizman explained in the blog post.

The researcher demonstrated an attack that could take place using the vulnerability by showing a screenshot highlighting the content of the hosts file fetched from a victim's computer remotely using the WhatsApp desktop application.

Advertisement

WhatsApp vulnerability on its desktop has been demonstrated
Photo Credit: PerimeterX

Advertisement

 

Facebook patched the vulnerability upon receiving an alert from Weizman last year. Moreover, the vulnerability is classed as “high”.

"A vulnerability in WhatsApp Desktop versions prior to 0.3.9309 when paired with WhatsApp for iPhone versions prior to 2.20.10 allows cross-site scripting and local file reading. Exploiting the vulnerability requires the victim to click a link preview from a specially crafted text message," reads the description of the WhatsApp vulnerability provided in the US National Vulnerability Data (NVD).

Late last month, the NVD site revealed that WhatsApp disclosed as many as 12 vulnerabilities in 2019, including seven “critical” ones. The number of vulnerabilities disclosed was significantly higher than the one or two security flaws the instant messaging app reported in the past few years.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Redmi Note 15 SE 5G to Launch With a Larger Battery Than Note 15 5G
  2. Meta Launches First Prescription-Focussed Smart Glasses
  3. Google Finally Lets Users Change Their Gmail Address
  4. iQOO 15 Apex Colour Option Revealed, Will Launch in India on April 1
  5. Google Pixel 11 Pro Leaked Renders Hint at These Design Updates
  6. Gmail Rolls Out AI Inbox With Smart Prioritisation for These Users
  7. OnePlus Nord 6 Camera Configuration Revealed as India Launch Draws Near
  8. Oppo Reveals Find X9 Ultra Global Launch Date, Teases Find X9s Pro Cameras
  9. Instagram Might Be Testing a 'Plus' Subscription With These Features
  10. Vivo V70 FE Roundup: Launch Date, Expected Price in India, Specifications
  1. Lava Bold N2 Lite Launched in India With 5,000mAh Battery, 6.75-Inch Display: Price, Specifications
  2. Google Pixel 11 Pro Leaked Renders Indicate It Might Sport Thinner Bezels Than the Pixel 10 Pro
  3. Gmail's AI Inbox Feature With Smart Prioritisation Rolls Out for Google AI Ultra Subscribers in the US
  4. Ray-Ban Meta Optics Styles Launched as Meta’s First Prescription-Focussed Smart Glasses: Price, Specifications
  5. Google Finally Lets Users Change Their Gmail Address; US Rollout Begins
  6. Realme C100 5G, Realme C100i Price, Colour Options, Key Features Leak Ahead of Expected April Launch
  7. iQOO 15 Apex Colour Option Revealed, Will Launch in India on April 1
  8. Google Warns Quantum Computers Could Crack Cryptographic Systems Sooner Than Expected
  9. Xiaomi 18 Pro Max Leak Points to New 200-Megapixel Sensor With Better Efficiency
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.