pod2g claims that this flaw has existed since the first iPhone was launched in 2007. However it was not spotted by anyone, including Apple that is the designer and manufacturer of these devices.
pod2g also highlights that this flaw can be used for phishing attempts that link users to websites, which steal personal information. Hackers may additionally try to create trust among phone users, so that further communications (with a malicious attempt) can happen.
In most cases criminals would need the name and number of trusted contacts of the recipient. This is necessary so that phone users can be deceived that the sender is a person known to them. The phishing example, on the other hand, is enough to highlight the criticality of this issue that needs to be curbed immediately.
We are now expecting Apple to fix the flaw soon, as well as update its latest phone models to keep them away from such flaws.