Critical Command Execution Vulnerability in WeChat Linux Client (QVD-2026-7687)

A high‑severity (CVSS 8.0) command‑execution flaw (QVD‑2026‑7687) in WeChat Linux versions ≤ 4.1.0.13 lets attackers gain system privileges by tricking users into opening malicious filenames, with a public PoC and a security patch available from version 4.1.0.16 onward.

Black & White Path
Black & White Path
Black & White Path
Critical Command Execution Vulnerability in WeChat Linux Client (QVD-2026-7687)

Vulnerability Overview

Name: WeChat Linux version command execution vulnerability<br/> ID: QVD‑2026‑7687<br/> Public Disclosure: 2026‑02‑10<br/> Severity: High (CVSS 3.1 score 8.0)<br/> Threat Type: Command execution<br/> Exploit Likelihood: High

Impact Description

Attackers can lure a user to open a file with a malicious filename, causing the client to execute arbitrary commands and obtain system privileges. The vulnerability potentially affects millions of users.

Exploit Conditions

The only condition required is that the victim clicks a maliciously crafted file.

Affected Scope

Affected Component: WeChat Linux client<br/> Affected Versions: Linux version ≤ 4.1.0.13<br/> Other Affected Components: None

Reproduction Status

Security researchers at QiAnXin CERT have successfully reproduced the vulnerability. The PoC is publicly available, and a screenshot of the exploit is shown below.

WeChat Linux vulnerability PoC screenshot
WeChat Linux vulnerability PoC screenshot

Mitigation Recommendations

Update the client to the latest version that includes the security patch:

WeChat Linux version ≥ 4.1.0.16

Download URL: https://linux.weixin.qq.com/ Customers are advised to perform a self‑check and apply the update promptly due to the large impact scope.

Reference

Official security advisory and patch released by WeChat Linux team. Source: HACK之道.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

LinuxCVEVulnerabilitySecurity PatchWeChatCommand Execution
Black & White Path
Written by

Black & White Path

We are the beacon of the cyber world, a stepping stone on the road to security.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.