The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-23863

CVE-2026-23863: WhatsApp for Windows RCE Vulnerability

CVE-2026-23863 is a remote code execution vulnerability in WhatsApp for Windows caused by attachment spoofing. Malicious files with NUL bytes could appear safe but execute code. This article covers technical details, affected versions, and mitigation.

Published: May 7, 2026

CVE-2026-23863 Overview

CVE-2026-23863 is an attachment spoofing vulnerability in WhatsApp for Windows versions prior to 2.3000.1032164386.258709. The flaw allows maliciously formatted documents containing embedded NUL bytes in the filename to display in the application as one file type while executing as a different type when opened. An attacker can craft a file that appears benign, such as an image or document, but runs as an executable on the victim's system. The issue is tracked under [CWE-158] (Improper Neutralization of Null Byte or NUL Character). According to the vendor advisory, there is no evidence of exploitation in the wild.

Critical Impact

Successful exploitation requires user interaction to open the attachment, after which arbitrary executable code runs on the Windows host, compromising integrity of the user's system.

Affected Products

  • WhatsApp for Windows versions prior to 2.3000.1032164386.258709
  • Windows desktop client distributions of WhatsApp
  • Systems where users open attachments received through WhatsApp

Discovery Timeline

  • 2026-05-01 - CVE-2026-23863 published to NVD
  • 2026-05-04 - Last updated in NVD database

Technical Details for CVE-2026-23863

Vulnerability Analysis

The vulnerability stems from improper handling of NUL byte characters (\\x00) in attachment filenames within WhatsApp for Windows. When a sender transmits a file with a crafted filename containing an embedded NUL byte, the WhatsApp client renders the filename in its user interface up to the NUL terminator. The underlying Windows file handling logic, however, processes the full filename including content after the NUL byte. This mismatch creates a presentation layer that disagrees with the execution layer.

The attack requires user interaction. The recipient must open the attachment from within WhatsApp for the spoofed file to execute. Network attack delivery is possible because WhatsApp transports the attachment from a remote sender to the Windows client.

Root Cause

The root cause is improper neutralization of NUL characters during filename parsing, classified as [CWE-158]. WhatsApp for Windows uses one string representation to display the filename and extension to the user, while passing a different string representation to the operating system shell when launching the file. An adversary leverages this inconsistency to disguise an executable payload as a benign document type.

Attack Vector

An attacker sends a victim a WhatsApp message containing an attachment whose filename embeds a NUL byte before a fake extension, for example invoice.pdf\\x00.exe. The WhatsApp UI displays the filename truncated at the NUL byte, showing invoice.pdf to the user. When the user double-clicks the attachment, Windows executes the file according to its true extension, running the executable payload. The vulnerability does not require elevated privileges and can be triggered remotely via standard WhatsApp messaging.

No public proof-of-concept code has been released. Refer to the Facebook Security Advisory CVE-2026-23863 and the WhatsApp Security Advisory 2026 for vendor technical details.

Detection Methods for CVE-2026-23863

Indicators of Compromise

  • Files received via WhatsApp containing NUL bytes (0x00) in their filenames or metadata
  • Process creation events where a child process spawned from the WhatsApp client points to an executable file (.exe, .scr, .bat, .cmd, .js, .vbs) saved from chat attachments
  • Recently saved attachments in the WhatsApp downloads directory whose filenames display one extension but resolve to another on disk

Detection Strategies

  • Hunt for executable processes whose parent process is WhatsApp.exe or related Electron components, especially executions launched immediately after attachment download
  • Inspect filesystem entries for filenames containing the byte sequence 0x00 followed by additional characters, which indicates intentional truncation manipulation
  • Correlate WhatsApp attachment save events with subsequent execution of binaries from user %TEMP% or %APPDATA% directories

Monitoring Recommendations

  • Enable Windows Sysmon Event ID 1 (process creation) and Event ID 11 (file create) and forward to a central analytics platform for filename anomaly review
  • Alert on execution of unsigned binaries originating from WhatsApp's downloads or media folders
  • Track WhatsApp client version inventory across managed Windows endpoints to identify hosts running versions prior to 2.3000.1032164386.258709

How to Mitigate CVE-2026-23863

Immediate Actions Required

  • Update WhatsApp for Windows to version 2.3000.1032164386.258709 or later on every endpoint
  • Audit endpoints for the installed WhatsApp version and prioritize remediation on hosts where the client is in active use
  • Instruct users not to open attachments from unknown WhatsApp senders until patching is complete

Patch Information

Meta has released a fixed version of WhatsApp for Windows that properly neutralizes NUL bytes in attachment filenames. Install version 2.3000.1032164386.258709 or later through the Microsoft Store or the WhatsApp installer. Patch details are documented in the Facebook Security Advisory CVE-2026-23863 and the WhatsApp Security Advisory 2026.

Workarounds

  • Block WhatsApp for Windows execution via application control policies until the patch is deployed
  • Configure Windows file association warnings and require explicit confirmation for executable file types launched from messaging clients
  • Restrict attachment downloads from WhatsApp to a controlled directory and scan files with an endpoint security solution before user access
bash
# PowerShell: identify installed WhatsApp for Windows version on an endpoint
Get-AppxPackage -Name "*WhatsApp*" | Select-Object Name, Version, PackageFullName

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechWhatsapp

  • SeverityMEDIUM

  • CVSS Score6.5

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityNone
  • CWE References
  • CWE-158
  • Technical References
  • Facebook Security Advisory CVE-2026-23863

  • WhatsApp Security Advisory 2026
  • Related CVEs
  • CVE-2025-30401: WhatsApp for Windows RCE Vulnerability

  • CVE-2026-23866: WhatsApp SSRF Vulnerability in iOS/Android

  • CVE-2025-55177: WhatsApp Authorization Bypass Vulnerability

  • CVE-2023-38537: WhatsApp Use-After-Free Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English