Description

A newly identified security vulnerability in Zoom Workplace Apps (CVE-2025-27441 and CVE-2025-27442) puts millions of users at risk of malicious script injection due to cross-site scripting (XSS) flaws. With a medium severity rating (CVSS 4.6), this vulnerability enables unauthenticated attackers on the same network—such as public Wi-Fi or corporate intranets—to execute arbitrary code, potentially compromising meetings. The flaw stems from inadequate input validation within Zoom’s chat and collaboration tools. Attackers can inject harmful scripts into active meetings without requiring user interaction by exploiting how Zoom processes network data packets. These scripts can hijack sessions, steal credentials, or deploy malware, making hybrid work and shared office environments particularly vulnerable. The affected versions include Zoom Workplace Desktop Apps for Windows, macOS, and Linux, as well as mobile apps for iOS and Android, specifically those running versions earlier than 6.3.10. Zoom has released patches to address these issues and strongly advises users to update their applications to prevent exploitation. Beyond the XSS vulnerabilities, CVE-2025-27443 (CVSS 2.8) involves improper variable initialization in Windows apps, potentially allowing authenticated users to modify local configurations. Additional vulnerabilities (CVE-2025-30670, CVE-2025-30671, and CVE-2025-30672) introduce null pointer dereference bugs that could trigger application crashes, though these require elevated privileges to exploit. While Zoom has not yet observed any active exploitation of these flaws, the company cautions that proof-of-concept exploits could emerge quickly. Users are urged to update their applications immediately, as delays in patching similar vulnerabilities in the past have led to widespread security incidents.