Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11760: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in wpcenter eRoom – Webinar & Meeting Plugin for Zoom, Google Meet, Microsoft Teams

0
Medium
VulnerabilityCVE-2025-11760cvecve-2025-11760cwe-200
Published: Sat Oct 25 2025 (10/25/2025, 01:45:55 UTC)
Source: CVE Database V5
Vendor/Project: wpcenter
Product: eRoom – Webinar & Meeting Plugin for Zoom, Google Meet, Microsoft Teams

Description

The eRoom – Webinar & Meeting Plugin for Zoom, Google Meet, Microsoft Teams plugin for WordPress is vulnerable to exposure of sensitive information in all versions up to, and including, 1.5.6. This is due to the plugin exposing Zoom SDK secret keys in client-side JavaScript within the meeting view template. This makes it possible for unauthenticated attackers to extract the sdk_secret value, which should remain server-side, compromising the security of the Zoom integration and allowing attackers to generate valid JWT signatures for unauthorized meeting access.

AI-Powered Analysis

AILast updated: 10/25/2025, 02:35:29 UTC

Technical Analysis

The vulnerability identified as CVE-2025-11760 affects the eRoom – Webinar & Meeting Plugin for Zoom, Google Meet, Microsoft Teams, a WordPress plugin designed to integrate popular video conferencing platforms into websites. The core issue is the exposure of Zoom SDK secret keys within client-side JavaScript embedded in the meeting view template. These secret keys, specifically the sdk_secret, are intended to remain confidential on the server side to prevent unauthorized use. However, due to improper handling, the plugin includes these secrets in the client-side code, making them accessible to any visitor of the webpage without requiring authentication or interaction. An attacker can extract the sdk_secret and use it to generate valid JSON Web Tokens (JWTs), which are used to authenticate and authorize access to Zoom meetings. This unauthorized access could allow attackers to join meetings, potentially eavesdrop, or gather sensitive information shared during sessions. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and has a CVSS 3.1 base score of 5.3, indicating medium severity. The attack vector is network-based with low attack complexity, no privileges required, and no user interaction needed. The scope is unchanged, and the impact affects confidentiality only, with no direct impact on integrity or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. Organizations using this plugin should be aware of the risk posed by the exposure of secret keys and the potential for unauthorized meeting access.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of virtual meetings conducted via Zoom integrated through the vulnerable plugin. Unauthorized access to meetings could lead to exposure of sensitive corporate information, intellectual property, or personal data, potentially violating GDPR requirements. The impact is particularly critical for sectors relying heavily on secure communications, such as finance, healthcare, legal, and government institutions. Although the vulnerability does not affect data integrity or availability, the breach of confidentiality alone can result in reputational damage, regulatory penalties, and loss of trust. Since exploitation requires no authentication or user interaction, the risk of automated or opportunistic attacks is elevated. Organizations using WordPress sites with this plugin for webinar or meeting functionalities are at risk of unauthorized meeting infiltration, which could facilitate espionage, data leakage, or social engineering attacks. The absence of known exploits in the wild provides a window for proactive mitigation but should not lead to complacency.

Mitigation Recommendations

Immediate mitigation should focus on removing any Zoom SDK secret keys from client-side JavaScript to prevent exposure. Administrators should audit the plugin’s code and configuration to ensure secrets are stored and used exclusively on the server side. Until an official patch is released, consider disabling the plugin or replacing it with alternative secure solutions for webinar and meeting integrations. Implement strict access controls and monitoring on WordPress administrative interfaces to prevent unauthorized changes. Employ network-level protections such as Web Application Firewalls (WAFs) to detect and block suspicious requests targeting the plugin’s meeting views. Regularly review logs for unusual access patterns that may indicate exploitation attempts. Educate users and administrators about the risks of exposing sensitive keys and the importance of secure coding practices. Once a vendor patch is available, prioritize timely updates. Additionally, consider rotating Zoom SDK secrets and credentials to invalidate any potentially compromised tokens. Finally, conduct security assessments of all third-party plugins integrated into WordPress environments to identify similar risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-10-14T20:12:49.862Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fc33f2f816635dda09c014

Added to database: 10/25/2025, 2:20:34 AM

Last enriched: 10/25/2025, 2:35:29 AM

Last updated: 10/25/2025, 1:44:47 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats