A critical vulnerability in WhatsApp’s infrastructure exposed metadata of over **3.5 billion users globally**, including phone numbers, approximate locations, device types, OS details, account ages, and contact lists. Researchers at the University of Vienna demonstrated that the flaw allowed **unlimited unauthorized data requests**, enabling adversaries to correlate metadata into detailed user profiles across **245+ countries**. Particularly alarming was the exposure of users in **high-surveillance regions (China, Iran, Myanmar)**, where such leaks could trigger state-level tracking or repression. While Meta (Advisory 2025) claims no evidence of malicious exploitation, the breach’s scale and the **geopolitical sensitivity of the leaked data**—combined with the potential for **mass profiling, targeted phishing, or state-sponsored surveillance**—undermine trust in the platform’s privacy safeguards. The incident reignites debates on **global communication security** and the risks of centralized metadata repositories in messaging apps.
Source: https://www.cybersecurity-insiders.com/whatsapp-vulnerability-leaks-meta-data-of-3-5-billion-users/
Meta cybersecurity rating report: https://www.rankiteo.com/company/meta
"id": "MET1032410112025",
"linkid": "meta",
"type": "Vulnerability",
"date": "6/2025",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': '3.5 billion',
'industry': 'technology/communications',
'location': 'Global (245+ countries)',
'name': 'WhatsApp (Meta Platforms, Inc.)',
'size': '3.5 billion users',
'type': 'messaging platform'}],
'attack_vector': ['unauthorized API/data request abuse',
'lack of rate-limiting on metadata queries'],
'data_breach': {'data_exfiltration': 'Potential (researchers demonstrated '
'proof-of-concept; no evidence of wild '
'exploitation)',
'number_of_records_exposed': '3.5 billion',
'personally_identifiable_information': ['phone numbers',
'approximate '
'locations',
'device/OS '
'identifiers'],
'sensitivity_of_data': 'Moderate to High (enables user '
'profiling, targeted attacks, or '
'surveillance)',
'type_of_data_compromised': ['metadata', 'contact lists']},
'description': 'Cybersecurity experts uncovered a critical vulnerability in '
'WhatsApp that exposed metadata of over 3.5 billion users '
'globally. The flaw allowed unauthorized access to sensitive '
'metadata, including phone numbers, approximate locations, '
'device types, operating systems, account ages, and contact '
'lists. Researchers at the University of Vienna demonstrated '
'the ability to send unlimited data requests, correlating '
'metadata to build detailed user profiles across 245+ '
"countries. Meta (WhatsApp's parent company) claims the issue "
'is resolved, with no evidence of malicious exploitation, but '
'the incident raises significant privacy and geopolitical '
'concerns, particularly for users in restricted-access '
'countries like China, Iran, and Myanmar.',
'impact': {'brand_reputation_impact': 'High (global scrutiny over privacy '
'safeguards in major communication '
'platforms)',
'data_compromised': ['metadata (phone numbers, locations, '
'device/OS details, account ages)',
'contact lists (associated phone numbers)'],
'identity_theft_risk': 'Moderate (metadata could enable targeted '
'phishing or profiling)',
'systems_affected': ['WhatsApp servers',
'user metadata databases']},
'investigation_status': 'Ongoing (no evidence of malicious exploitation per '
'Meta; independent research suggests potential prior '
'abuse)',
'lessons_learned': 'Critical importance of rate-limiting and request '
'validation for metadata APIs; need for proactive '
'vulnerability testing in global communication platforms '
'with high-risk user bases (e.g., restricted-access '
'countries).',
'post_incident_analysis': {'corrective_actions': ['Vulnerability patch (per '
'Meta)',
'Potential review of '
'metadata access controls'],
'root_causes': ['Lack of rate-limiting on metadata '
'API endpoints',
'Insufficient validation of data '
'request volumes']},
'recommendations': ['Implement stricter API rate-limiting and anomaly '
'detection for metadata queries.',
'Conduct third-party red-team exercises to identify '
'similar flaws.',
'Enhance transparency in disclosing vulnerabilities '
'affecting high-risk regions.',
'Review metadata retention policies to minimize exposure '
'risks.'],
'references': [{'source': 'University of Vienna Security Research Report'},
{'source': 'Meta Advisory 2025'}],
'response': {'communication_strategy': ['Public advisory (Meta Advisory 2025)',
'Media statements'],
'containment_measures': ['Vulnerability patched at root level '
'(per Meta)'],
'incident_response_plan_activated': 'Yes (Meta Advisory 2025 '
'issued)',
'third_party_assistance': ['University of Vienna security '
'researchers (disclosure)']},
'stakeholder_advisories': ['Meta Advisory 2025'],
'title': 'Critical WhatsApp Metadata Exposure Vulnerability Affecting 3.5 '
'Billion Users',
'type': ['data exposure', 'metadata leak', 'vulnerability exploitation'],
'vulnerability_exploited': 'Unrestricted metadata access due to missing '
'request throttling/validation on WhatsApp servers'}