Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30664: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Zoom Communications, Inc Zoom Workplace Apps

0
Medium
VulnerabilityCVE-2025-30664cvecve-2025-30664cwe-79
Published: Wed May 14 2025 (05/14/2025, 17:33:18 UTC)
Source: CVE
Vendor/Project: Zoom Communications, Inc
Product: Zoom Workplace Apps

Description

Cross-site scripting in some Zoom Workplace Apps may allow an authenticated user to conduct an escalation of privilege via local access.

AI-Powered Analysis

AILast updated: 10/03/2025, 00:12:58 UTC

Technical Analysis

CVE-2025-30664 is a medium-severity vulnerability classified under CWE-79, which pertains to improper neutralization of input during web page generation, commonly known as Cross-site Scripting (XSS). This vulnerability affects Zoom Communications, Inc's Zoom Workplace Apps. Specifically, it allows an authenticated user with local access to escalate privileges by exploiting the XSS flaw. The vulnerability arises because the application does not properly sanitize or encode user-supplied input before rendering it in the web interface, enabling malicious scripts to execute in the context of another user's session or with elevated privileges. The CVSS v3.1 score of 6.6 reflects a scenario where the attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but user interaction is necessary (UI:R). The impact on confidentiality and integrity is high, while availability is not affected. No known exploits are reported in the wild yet, and no patches are currently linked, indicating that mitigation may rely on vendor updates or workarounds. The vulnerability's exploitation could lead to unauthorized access to sensitive information or manipulation of application functions within the Zoom Workplace environment, potentially compromising organizational communications and data integrity.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of Zoom Workplace Apps for internal communications and collaboration. Exploitation could lead to unauthorized disclosure of confidential information, manipulation of communication workflows, and potential lateral movement within corporate networks. Given the requirement for local authenticated access, insider threats or compromised user accounts could leverage this vulnerability to escalate privileges and access sensitive resources. This is particularly critical in sectors with stringent data protection regulations such as GDPR, where breaches involving personal or sensitive data could result in severe legal and financial penalties. Additionally, the disruption of trusted communication platforms could undermine operational continuity and stakeholder confidence.

Mitigation Recommendations

Organizations should prioritize the following specific actions: 1) Monitor Zoom's official security advisories closely for patches addressing CVE-2025-30664 and apply updates promptly once available. 2) Restrict local access to Zoom Workplace Apps only to trusted and verified users, implementing strict access controls and endpoint security measures to prevent unauthorized local access. 3) Employ application whitelisting and endpoint detection and response (EDR) solutions to detect anomalous script execution or privilege escalation attempts within the Zoom app environment. 4) Conduct regular user training to raise awareness about the risks of executing untrusted content and the importance of safeguarding authentication credentials. 5) Implement network segmentation to limit the potential spread of an exploit from a compromised user to critical systems. 6) Consider deploying web application firewalls (WAF) or runtime application self-protection (RASP) tools that can detect and block XSS payloads in real-time if applicable to the Zoom Workplace Apps environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Zoom
Date Reserved
2025-03-24T22:35:25.475Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb8b3

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 10/3/2025, 12:12:58 AM

Last updated: 10/7/2025, 1:46:22 PM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats