### [CVE-2019-18426](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18426) ![](https://img.shields.io/static/v1?label=Product&message=WhatsApp%20Desktop&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=!%3D%3E%200.3.9309%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')%20(CWE-79)&color=brighgreen) ### Description A vulnerability in WhatsApp Desktop versions prior to 0.3.9309 when paired with WhatsApp for iPhone versions prior to 2.20.10 allows cross-site scripting and local file reading. Exploiting the vulnerability requires the victim to click a link preview from a specially crafted text message. ### POC #### Reference - http://packetstormsecurity.com/files/157097/WhatsApp-Desktop-0.3.9308-Cross-Site-Scripting.html - http://packetstormsecurity.com/files/157097/WhatsApp-Desktop-0.3.9308-Cross-Site-Scripting.html #### Github - https://github.com/0dayhunter/Facebook-BugBounty-Writeups - https://github.com/0xT11/CVE-POC - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/PerimeterX/CVE-2019-18426 - https://github.com/abhav/nvd_scrapper - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/jaiswalakshansh/Facebook-BugBounty-Writeups - https://github.com/weizman/weizman