Tuesday, March 4, 2025
HomeCyber Security NewsWhatsApp’s “View Once” Feature Flaw Let Anyone View the Image Unlimitedly

WhatsApp’s “View Once” Feature Flaw Let Anyone View the Image Unlimitedly

Published on

SIEM as a Service

Follow Us on Google News

Privacy is the cornerstone of digital communication in today’s world, and platforms like WhatsApp consistently introduce features to enhance user security.

One such feature is WhatsApp’s “View Once” option, which ensures that sensitive photos and videos disappear after being viewed once.

However, recent findings suggest that this privacy guarantee might not be as foolproof as users believe.

A security researcher has revealed a loophole in the “View Once” feature, exposing a flaw that allows media sent via this option to remain accessible even after it is supposed to vanish.

This discovery sheds light on the potential risks of relying on such features for private communication.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

The Loophole Explained

The researcher, during routine testing, discovered a surprising bypass of the “View Once” functionality. Typically, this feature allows users to send a photo or video that disappears immediately after being viewed.

However, the researcher found a way to access a “disappeared” image by navigating to WhatsApp’s “Manage Storage” settings. Here’s how the process unfolded:

  1. A friend sent a “View Once” image.
  2. After viewing the image, it was expected to delete itself automatically.
  3. However, by visiting Settings > Storage and Data > Manage Storage and sorting the sender’s chat by “Newest,” the image was still visible and could be accessed again.

This unexpected behavior directly violated the core promise of the “View Once” feature, raising questions about its reliability and security.

Meta’s Response

After discovering this issue, the researcher responsibly reported it to Meta, WhatsApp’s parent company, through their bug bounty program.

Meta acknowledged the report but stated that they were already aware of the issue and were actively working on a fix.

They declined to reward the researcher under their program, saying, “We have already been aware of this issue internally.”

While it was reassuring to know that Meta was addressing the flaw, the lack of acknowledgment in the form of a bounty left the researcher feeling underappreciated for their efforts.

This seemingly small bug carries significant consequences:

  • Erosion of Trust: Users depend on features like “View Once” for sharing sensitive content securely. A flaw of this nature undermines that confidence.
  • Potential Privacy Breach: Sensitive images meant for temporary viewing could be retained or misused, posing risks to user safety.

The discovery emphasizes the critical need for rigorous testing of privacy-centric features.

Digital privacy is not just a feature but a promise to users, and even minor flaws can have widespread implications.

While Meta works on a resolution, this serves as a reminder that users should exercise caution when sharing sensitive media, even with supposedly “secure” features.

Collect Threat Intelligence with TI Lookup to improve your company’s security - Get 50 Free Request

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...