{"api_version":"1","generated_at":"2026-05-13T07:40:47+00:00","cve":"CVE-2026-23863","urls":{"html":"https://cve.report/CVE-2026-23863","api":"https://cve.report/api/cve/CVE-2026-23863.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-23863","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-23863"},"summary":{"title":"CVE-2026-23863","description":"An attachment spoofing issue in WhatsApp for Windows prior to v2.3000.1032164386.258709 could have allowed maliciously formatted documents with embedded NUL bytes in the filename to be shown in the application as one type of file but run as an executable when opened. We have not seen evidence of exploitation in the wild.","state":"PUBLISHED","assigner":"Meta","published_at":"2026-05-01 16:16:29","updated_at":"2026-05-11 19:59:52"},"problem_types":["CWE-158","Improper Neutralization of Null Byte or NUL Character (CWE-158)","CWE-158 CWE-158 Improper Neutralization of Null Byte or NUL Character"],"metrics":[{"version":"3.1","source":"cve-assign@fb.com","type":"Secondary","score":"6.5","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"6.5","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C","data":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C","version":"3.1"}}],"references":[{"url":"https://www.facebook.com/security/advisories/cve-2026-23863","name":"https://www.facebook.com/security/advisories/cve-2026-23863","refsource":"cve-assign@fb.com","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.whatsapp.com/security/advisories/2026","name":"https://www.whatsapp.com/security/advisories/2026","refsource":"cve-assign@fb.com","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-23863","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23863","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Facebook","product":"WhatsApp Desktop for Windows","version":"affected 2.3000.*.252500 2.3000.1032164386.258709 custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"23863","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"whatsapp","cpe5":"whatsapp","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"windows","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"23863","cve":"CVE-2026-23863","epss":"0.000110000","percentile":"0.013080000","score_date":"2026-05-12","updated_at":"2026-05-13 00:11:53"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-23863","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-05-01T17:40:45.569668Z","version":"2.0.3"},"type":"ssvc"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-158","description":"CWE-158 Improper Neutralization of Null Byte or NUL Character","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-01T17:41:14.681Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"WhatsApp Desktop for Windows","vendor":"Facebook","versions":[{"lessThan":"2.3000.1032164386.258709","status":"affected","version":"2.3000.*.252500","versionType":"custom"}]}],"dateAssigned":"2026-04-20T00:00:00.000Z","descriptions":[{"lang":"en","value":"An attachment spoofing issue in WhatsApp for Windows prior to v2.3000.1032164386.258709 could have allowed maliciously formatted documents with embedded NUL bytes in the filename to be shown in the application as one type of file but run as an executable when opened. We have not seen evidence of exploitation in the wild."}],"metrics":[{"cvssV3_1":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"description":"Improper Neutralization of Null Byte or NUL Character (CWE-158)","lang":"en"}]}],"providerMetadata":{"dateUpdated":"2026-05-01T16:15:38.171Z","orgId":"4fc57720-52fe-4431-a0fb-3d2c8747b827","shortName":"Meta"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://www.facebook.com/security/advisories/cve-2026-23863"},{"tags":["x_refsource_CONFIRM"],"url":"https://www.whatsapp.com/security/advisories/2026"}]}},"cveMetadata":{"assignerOrgId":"4fc57720-52fe-4431-a0fb-3d2c8747b827","assignerShortName":"Meta","cveId":"CVE-2026-23863","datePublished":"2026-05-01T16:01:39.565Z","dateReserved":"2026-01-16T19:49:26.308Z","dateUpdated":"2026-05-01T17:41:14.681Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-01 16:16:29","lastModifiedDate":"2026-05-11 19:59:52","problem_types":["CWE-158","Improper Neutralization of Null Byte or NUL Character (CWE-158)","CWE-158 CWE-158 Improper Neutralization of Null Byte or NUL Character"],"metrics":{"cvssMetricV31":[{"source":"cve-assign@fb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:windows:*:*","versionEndExcluding":"2.3000.1032164386.258709","matchCriteriaId":"1E1C0BD0-0D92-438F-AB63-A267635A5FDF"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"23863","Ordinal":"1","Title":"CVE-2026-23863","CVE":"CVE-2026-23863","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"23863","Ordinal":"1","NoteData":"An attachment spoofing issue in WhatsApp for Windows prior to v2.3000.1032164386.258709 could have allowed maliciously formatted documents with embedded NUL bytes in the filename to be shown in the application as one type of file but run as an executable when opened. We have not seen evidence of exploitation in the wild.","Type":"Description","Title":"CVE-2026-23863"}]}}}