CVE-2025-11760: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in wpcenter eRoom – Webinar & Meeting Plugin for Zoom, Google Meet, Microsoft Teams
The eRoom – Webinar & Meeting Plugin for Zoom, Google Meet, Microsoft Teams plugin for WordPress is vulnerable to exposure of sensitive information in all versions up to, and including, 1.5.6. This is due to the plugin exposing Zoom SDK secret keys in client-side JavaScript within the meeting view template. This makes it possible for unauthenticated attackers to extract the sdk_secret value, which should remain server-side, compromising the security of the Zoom integration and allowing attackers to generate valid JWT signatures for unauthorized meeting access.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-11760 affects the wpcenter eRoom – Webinar & Meeting Plugin for WordPress, which integrates Zoom, Google Meet, and Microsoft Teams functionalities. Specifically, in all versions up to 1.5.6, the plugin improperly exposes Zoom SDK secret keys within client-side JavaScript embedded in the meeting view template. These SDK secret keys (sdk_secret) are intended to remain confidential on the server side to prevent unauthorized use. However, due to this exposure, unauthenticated attackers can extract these secrets directly from the client-side code without any authentication or user interaction. With access to the sdk_secret, attackers can generate valid JSON Web Tokens (JWTs) that authenticate them as legitimate users or services, enabling unauthorized access to Zoom meetings. This compromises the confidentiality of meetings and potentially allows attackers to join, listen, or disrupt sessions. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and has a CVSS 3.1 base score of 5.3, reflecting a medium severity level. The attack vector is network-based with low complexity and no privileges or user interaction required. Although no public exploits have been reported yet, the risk remains significant due to the sensitive nature of the exposed credentials and the widespread use of the plugin in WordPress environments.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of sensitive Zoom SDK secret keys, which undermines the security of the Zoom integration within the affected plugin. Attackers leveraging these secrets can generate valid JWT tokens, granting them unauthorized access to Zoom meetings. This can lead to breaches of confidentiality, including eavesdropping on private meetings, data leakage, and potential disruption of business operations. Organizations relying on this plugin for secure webinar and meeting management face risks of reputational damage, compliance violations (especially if sensitive or regulated data is discussed in meetings), and operational interruptions. Since the vulnerability requires no authentication or user interaction, it can be exploited remotely and at scale, increasing the threat surface. The exposure also raises concerns about trust in the plugin’s security practices and may necessitate broader security reviews of third-party integrations. Although the vulnerability does not directly impact integrity or availability, the confidentiality breach alone can have severe consequences depending on the sensitivity of the meetings conducted.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade the eRoom plugin to a version where the Zoom SDK secret keys are no longer exposed client-side; if no patched version is available, temporarily disabling the plugin or the Zoom integration is advisable. Developers should refactor the plugin code to ensure that all sensitive credentials, especially sdk_secret values, remain strictly server-side and are never embedded in client-side JavaScript or exposed in any frontend templates. Implementing server-side token generation and validation for Zoom JWTs is critical to prevent unauthorized token creation. Additionally, organizations should rotate any exposed Zoom SDK secret keys to invalidate any potentially compromised credentials. Monitoring access logs for unusual JWT generation or meeting join activity can help detect exploitation attempts. Employing Web Application Firewalls (WAFs) to detect and block suspicious requests targeting the plugin’s meeting view endpoints may provide temporary protection. Finally, conducting a security audit of all third-party plugins and integrations to ensure no other sensitive information is exposed client-side is recommended.
Affected Countries
United States, Canada, United Kingdom, Germany, Australia, India, Japan, France, Brazil, South Korea
CVE-2025-11760: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in wpcenter eRoom – Webinar & Meeting Plugin for Zoom, Google Meet, Microsoft Teams
Description
The eRoom – Webinar & Meeting Plugin for Zoom, Google Meet, Microsoft Teams plugin for WordPress is vulnerable to exposure of sensitive information in all versions up to, and including, 1.5.6. This is due to the plugin exposing Zoom SDK secret keys in client-side JavaScript within the meeting view template. This makes it possible for unauthenticated attackers to extract the sdk_secret value, which should remain server-side, compromising the security of the Zoom integration and allowing attackers to generate valid JWT signatures for unauthorized meeting access.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2025-11760 affects the wpcenter eRoom – Webinar & Meeting Plugin for WordPress, which integrates Zoom, Google Meet, and Microsoft Teams functionalities. Specifically, in all versions up to 1.5.6, the plugin improperly exposes Zoom SDK secret keys within client-side JavaScript embedded in the meeting view template. These SDK secret keys (sdk_secret) are intended to remain confidential on the server side to prevent unauthorized use. However, due to this exposure, unauthenticated attackers can extract these secrets directly from the client-side code without any authentication or user interaction. With access to the sdk_secret, attackers can generate valid JSON Web Tokens (JWTs) that authenticate them as legitimate users or services, enabling unauthorized access to Zoom meetings. This compromises the confidentiality of meetings and potentially allows attackers to join, listen, or disrupt sessions. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and has a CVSS 3.1 base score of 5.3, reflecting a medium severity level. The attack vector is network-based with low complexity and no privileges or user interaction required. Although no public exploits have been reported yet, the risk remains significant due to the sensitive nature of the exposed credentials and the widespread use of the plugin in WordPress environments.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of sensitive Zoom SDK secret keys, which undermines the security of the Zoom integration within the affected plugin. Attackers leveraging these secrets can generate valid JWT tokens, granting them unauthorized access to Zoom meetings. This can lead to breaches of confidentiality, including eavesdropping on private meetings, data leakage, and potential disruption of business operations. Organizations relying on this plugin for secure webinar and meeting management face risks of reputational damage, compliance violations (especially if sensitive or regulated data is discussed in meetings), and operational interruptions. Since the vulnerability requires no authentication or user interaction, it can be exploited remotely and at scale, increasing the threat surface. The exposure also raises concerns about trust in the plugin’s security practices and may necessitate broader security reviews of third-party integrations. Although the vulnerability does not directly impact integrity or availability, the confidentiality breach alone can have severe consequences depending on the sensitivity of the meetings conducted.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade the eRoom plugin to a version where the Zoom SDK secret keys are no longer exposed client-side; if no patched version is available, temporarily disabling the plugin or the Zoom integration is advisable. Developers should refactor the plugin code to ensure that all sensitive credentials, especially sdk_secret values, remain strictly server-side and are never embedded in client-side JavaScript or exposed in any frontend templates. Implementing server-side token generation and validation for Zoom JWTs is critical to prevent unauthorized token creation. Additionally, organizations should rotate any exposed Zoom SDK secret keys to invalidate any potentially compromised credentials. Monitoring access logs for unusual JWT generation or meeting join activity can help detect exploitation attempts. Employing Web Application Firewalls (WAFs) to detect and block suspicious requests targeting the plugin’s meeting view endpoints may provide temporary protection. Finally, conducting a security audit of all third-party plugins and integrations to ensure no other sensitive information is exposed client-side is recommended.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-14T20:12:49.862Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68fc33f2f816635dda09c014
Added to database: 10/25/2025, 2:20:34 AM
Last enriched: 2/27/2026, 7:18:55 PM
Last updated: 3/25/2026, 12:11:54 AM
Views: 282
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.