A critical Telegram flaw could allow zero-click remote code execution on devices, but Telegram denies it.
Researcher Michael DePlante (@izobashi) of TrendAI Zero Day disclosed a new Telegram vulnerability through Zero Day Initiative (ZDI).
The vulnerability, tracked as ZDI-CAN-30207 (CVSS score of 9.8) allows attackers to execute code on targeted devices without any user interaction. This vulnerability is especially dangerous because an attacker can exploit it simply by sending a malicious animated sticker, with no action required from the victim. The vulnerability lies in how Telegram automatically processes media to generate previews, allowing crafted files to trigger code execution.
The flaw poses a serious security risk, especially as no patch is currently available, raising concerns across the cybersecurity community.

The vulnerability affects Telegram on Android and Linux; if exploited, it allows attackers to take full control of a device.
EXPLORE MORE
More details on Jesús Luzardo’s contract extension – Phillies Nation
The Phillies on Tuesday made Jesús Luzardo’s five-year contract extension official. The…
Zack Wheeler’s Road to Recovery: Phillies Ace Hits Major Milestone
The energy at the Carpenter Complex in Clearwater was electric this Monday…
THE BREAKUP: James Woods Just Dumped the GOP—And He’s Not Looking Back
James Woods is officially swiping left on the Republican Party. At 78…
Stellar Wanderer DX Just Landed – And It’s Like Jumping Back to the Coolest Space Games Ever!
Whoa, check this out! Stellar Wanderer DX dropped today (March 12, 2026…
Little Red: Epic Combat Meets Enchanted Fairy Tale Magic
Little Red is on the way, mixing beloved storybook magic with exciting…
China now leads by a generation in hypersonic & anti-ship ballistic missiles
These 4 Chinese Dongfeng missiles from the 2025 V-Day parade: 2. DF-26D:…
At this time it is unclear if threat actors have already exploited it in attacks in the wild.
The Zero Day Initiative did not disclose technical details about the vulnerability to give the company time to address it by July 24, 2026.
The Italian National Cybersecurity Agency (ACN) reported that Telegram has denied the disclosed zero-click vulnerability, stating it does not exist. The company says all stickers are validated server-side before delivery, preventing malicious files from being used as an attack vector and making code execution via stickers technically impossible.
“Following direct discussions, Telegram Messenger has formally denied the existence of the previously reported zero-click vulnerability, stating that the flaw does not exist. The vendor claims that every sticker uploaded to the platform undergoes mandatory validation on its servers before being distributed to client applications.” reads an update published on the ACN’s advisory. “According to this official position, the centralized filtering process prevents corrupted stickers from being used as an attack vector, making it technically impossible to execute malicious code through this method.”
As a mitigation measure, Telegram Business users can limit incoming messages from new contacts. In Settings → Privacy and Security → Messages, they can restrict messages to saved contacts or Premium users only.
Exploits targeting popular platforms like Telegram can be worth millions on underground markets, and threat actors can quickly weaponize them.
