CVE-2026-23863 Overview
CVE-2026-23863 is an attachment spoofing vulnerability in WhatsApp for Windows versions prior to 2.3000.1032164386.258709. The flaw allows maliciously formatted documents containing embedded NUL bytes in the filename to display in the application as one file type while executing as a different type when opened. An attacker can craft a file that appears benign, such as an image or document, but runs as an executable on the victim's system. The issue is tracked under [CWE-158] (Improper Neutralization of Null Byte or NUL Character). According to the vendor advisory, there is no evidence of exploitation in the wild.
Critical Impact
Successful exploitation requires user interaction to open the attachment, after which arbitrary executable code runs on the Windows host, compromising integrity of the user's system.
Affected Products
- WhatsApp for Windows versions prior to 2.3000.1032164386.258709
- Windows desktop client distributions of WhatsApp
- Systems where users open attachments received through WhatsApp
Discovery Timeline
- 2026-05-01 - CVE-2026-23863 published to NVD
- 2026-05-04 - Last updated in NVD database
Technical Details for CVE-2026-23863
Vulnerability Analysis
The vulnerability stems from improper handling of NUL byte characters (\\x00) in attachment filenames within WhatsApp for Windows. When a sender transmits a file with a crafted filename containing an embedded NUL byte, the WhatsApp client renders the filename in its user interface up to the NUL terminator. The underlying Windows file handling logic, however, processes the full filename including content after the NUL byte. This mismatch creates a presentation layer that disagrees with the execution layer.
The attack requires user interaction. The recipient must open the attachment from within WhatsApp for the spoofed file to execute. Network attack delivery is possible because WhatsApp transports the attachment from a remote sender to the Windows client.
Root Cause
The root cause is improper neutralization of NUL characters during filename parsing, classified as [CWE-158]. WhatsApp for Windows uses one string representation to display the filename and extension to the user, while passing a different string representation to the operating system shell when launching the file. An adversary leverages this inconsistency to disguise an executable payload as a benign document type.
Attack Vector
An attacker sends a victim a WhatsApp message containing an attachment whose filename embeds a NUL byte before a fake extension, for example invoice.pdf\\x00.exe. The WhatsApp UI displays the filename truncated at the NUL byte, showing invoice.pdf to the user. When the user double-clicks the attachment, Windows executes the file according to its true extension, running the executable payload. The vulnerability does not require elevated privileges and can be triggered remotely via standard WhatsApp messaging.
No public proof-of-concept code has been released. Refer to the Facebook Security Advisory CVE-2026-23863 and the WhatsApp Security Advisory 2026 for vendor technical details.
Detection Methods for CVE-2026-23863
Indicators of Compromise
- Files received via WhatsApp containing NUL bytes (0x00) in their filenames or metadata
- Process creation events where a child process spawned from the WhatsApp client points to an executable file (.exe, .scr, .bat, .cmd, .js, .vbs) saved from chat attachments
- Recently saved attachments in the WhatsApp downloads directory whose filenames display one extension but resolve to another on disk
Detection Strategies
- Hunt for executable processes whose parent process is WhatsApp.exe or related Electron components, especially executions launched immediately after attachment download
- Inspect filesystem entries for filenames containing the byte sequence 0x00 followed by additional characters, which indicates intentional truncation manipulation
- Correlate WhatsApp attachment save events with subsequent execution of binaries from user %TEMP% or %APPDATA% directories
Monitoring Recommendations
- Enable Windows Sysmon Event ID 1 (process creation) and Event ID 11 (file create) and forward to a central analytics platform for filename anomaly review
- Alert on execution of unsigned binaries originating from WhatsApp's downloads or media folders
- Track WhatsApp client version inventory across managed Windows endpoints to identify hosts running versions prior to 2.3000.1032164386.258709
How to Mitigate CVE-2026-23863
Immediate Actions Required
- Update WhatsApp for Windows to version 2.3000.1032164386.258709 or later on every endpoint
- Audit endpoints for the installed WhatsApp version and prioritize remediation on hosts where the client is in active use
- Instruct users not to open attachments from unknown WhatsApp senders until patching is complete
Patch Information
Meta has released a fixed version of WhatsApp for Windows that properly neutralizes NUL bytes in attachment filenames. Install version 2.3000.1032164386.258709 or later through the Microsoft Store or the WhatsApp installer. Patch details are documented in the Facebook Security Advisory CVE-2026-23863 and the WhatsApp Security Advisory 2026.
Workarounds
- Block WhatsApp for Windows execution via application control policies until the patch is deployed
- Configure Windows file association warnings and require explicit confirmation for executable file types launched from messaging clients
- Restrict attachment downloads from WhatsApp to a controlled directory and scan files with an endpoint security solution before user access
# PowerShell: identify installed WhatsApp for Windows version on an endpoint
Get-AppxPackage -Name "*WhatsApp*" | Select-Object Name, Version, PackageFullName
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


