A now patched vulnerability in the WhatsApp messaging service could have led to user data being exposed. The vulnerability is described as an “out-of-bounds read-write vulnerability.” While the flaw required complex steps to exploit, it could have allowed an attacker to read sensitive information from WhatsApp memory. The vulnerability relates to a memory corruption issue in how WhatsApp processes and sends images on its platform. It was found that the image filter function in the app crashed when it was used with some specifically designed GIF files, leading the researchers to the point where they discovered the vulnerability. The vulnerability could be triggered after a user opens an attachment with a maliciously crafted image, tries to apply a filter and then sends the image with the filter applied back to the attacker. That scenario is unlikely hence the description of the steps being complex, but likewise if the attacker was using a hijacked account from a victim’s friend, the likelihood, while still slim, increases.