First published: Wed Mar 19 2025(Updated: )
The WhatsApp cloud service before late 2024 did not block certain crafted PDF content that can defeat a sandbox protection mechanism and consequently allow remote access to messaging applications by third parties, as exploited in the wild in 2024 for installation of Android malware associated with BIGPRETZEL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
<late 2024 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-30259 is classified as a high severity vulnerability due to its potential for allowing remote access to messaging applications.
CVE-2025-30259 exploits crafted PDF content that bypasses sandbox protections, enabling unauthorized access to messaging apps.
CVE-2025-30259 could compromise user privacy by allowing third parties to access private messages and data.
To mitigate CVE-2025-30259, users should update their WhatsApp Cloud Service to the latest version released after late 2024.
Yes, CVE-2025-30259 has been actively exploited in the wild, particularly for installing Android malware.