CVE-2024-45607

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-45607
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-45607.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-45607
Aliases
Published
2024-09-12T20:15:05Z
Modified
2025-07-29T11:14:26.663160Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

whatsapp-api-js is a TypeScript server agnostic Whatsapp's Official API framework. It's possible to check the payload validation using the WhatsAppAPI.verifyRequestSignature and expect false when the signature is valid. Incorrect Access Control, anyone using the post or verifyRequestSignature methods to handle messages is impacted. This vulnerability is fixed in 4.0.3.

References

Affected packages

Git / github.com/secreto31126/whatsapp-api-js

Affected ranges

Type
GIT
Repo
https://github.com/secreto31126/whatsapp-api-js
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.0.1
0.4.3-beta.2
0.5.0
0.5.0-beta.0
0.5.0-beta.1
0.5.0-beta.2
0.5.0-beta.3
0.6.1
0.6.1-beta.0
0.6.1-beta.1
0.6.1-beta.2
0.6.2
0.7.0
0.7.0-beta.0
0.7.1-beta.0
0.8.0
0.8.0-beta.0
0.8.0-beta.1
0.8.1
0.8.2

1.*

1.0.0-beta.0
1.0.0-beta.1
1.0.0-beta.2
1.0.0-beta.3
1.0.0-beta.4
1.0.0-beta.5
1.0.0-beta.6
1.0.0-beta.7
1.0.0-beta.8
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.5-beta.0
1.0.5-beta.1

2.*

2.0.0
2.0.0-beta.0
2.0.0-beta.1
2.0.1-beta.0
2.1.0
2.1.0-beta.0
2.1.1
2.1.1-beta.0
2.1.2
2.2.0
2.2.1
2.2.2
2.2.3-beta.0
2.3.0
2.3.0-beta.0
2.4.0
2.4.0-beta.0
2.4.0-beta.1
2.4.1-beta.0
2.5.0
2.5.1
2.6.0

3.*

3.0.0
3.0.0-beta.0
3.0.1
3.0.2-beta.0
3.1.0

4.*

4.0.0
4.0.0-beta.1
4.0.0-beta.2
4.0.0-beta.3
4.0.1
4.0.2

v0.*

v0.0.2
v0.0.3
v0.0.4
v0.1.0
v0.1.1
v0.1.2
v0.1.3
v0.1.4
v0.1.5
v0.1.6
v0.2.0
v0.2.1
v0.2.2
v0.2.3
v0.3.0
v0.3.1
v0.4.2
v0.4.3-beta.0
v0.4.3-beta.1