CVE-2026-30903: CWE-73 External control of file name or path in Zoom Communications Zoom Workplace
External Control of File Name or Path in the Mail feature of Zoom Workplace for Windows before 6.6.0 may allow an unauthenticated user to conduct an escalation of privilege via network access.
AI Analysis
Technical Summary
CVE-2026-30903 is a critical security vulnerability identified in the Mail feature of Zoom Workplace for Windows versions prior to 6.6.0. The vulnerability is classified under CWE-73, which pertains to external control of file name or path. This means that an attacker can influence the file path or name used by the application, potentially causing the system to access or modify unintended files. In this case, the flaw allows an unauthenticated attacker to escalate privileges by sending specially crafted network requests that manipulate file paths within the Mail feature. The vulnerability has a CVSS v3.1 base score of 9.6, reflecting its critical nature with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component, and it impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). Although no public exploits are currently known, the vulnerability's characteristics make it a prime target for attackers seeking to gain elevated access on affected systems. The lack of authentication requirement combined with network accessibility increases the risk of widespread exploitation. The vulnerability was reserved on March 6, 2026, and published on March 11, 2026, with no patch links currently available, emphasizing the urgency for Zoom Communications to release a fix and for organizations to apply mitigations.
Potential Impact
The impact of CVE-2026-30903 is severe for organizations using vulnerable versions of Zoom Workplace on Windows. Successful exploitation allows attackers to escalate privileges without authentication, potentially gaining administrative control over affected systems. This can lead to unauthorized access to sensitive communications, data theft, manipulation or deletion of critical files, and disruption of business operations. The vulnerability affects confidentiality, integrity, and availability simultaneously, increasing the risk of data breaches and operational downtime. Given Zoom Workplace's role in enterprise communication and collaboration, exploitation could compromise internal communications, expose intellectual property, and facilitate lateral movement within networks. The network-based attack vector means attackers can exploit this vulnerability remotely, increasing the threat surface. Organizations lacking timely patching or mitigations may face significant operational and reputational damage, especially in sectors where secure communication is critical.
Mitigation Recommendations
To mitigate CVE-2026-30903, organizations should immediately upgrade Zoom Workplace for Windows to version 6.6.0 or later once available. Until patches are released, restrict network access to the Mail feature by implementing network segmentation and firewall rules that limit inbound traffic to trusted sources. Employ application whitelisting and endpoint protection solutions to detect and block suspicious file path manipulations. Monitor logs and network traffic for unusual activity related to file operations within Zoom Workplace. Educate users about the risk of interacting with unexpected or suspicious communications within the Mail feature to reduce the likelihood of user interaction exploitation. Coordinate with Zoom Communications for timely updates and advisories. Additionally, consider deploying intrusion detection systems (IDS) with signatures tailored to detect exploitation attempts targeting this vulnerability. Regularly review and update incident response plans to address potential exploitation scenarios involving privilege escalation.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Brazil, Netherlands, Singapore
CVE-2026-30903: CWE-73 External control of file name or path in Zoom Communications Zoom Workplace
Description
External Control of File Name or Path in the Mail feature of Zoom Workplace for Windows before 6.6.0 may allow an unauthenticated user to conduct an escalation of privilege via network access.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-30903 is a critical security vulnerability identified in the Mail feature of Zoom Workplace for Windows versions prior to 6.6.0. The vulnerability is classified under CWE-73, which pertains to external control of file name or path. This means that an attacker can influence the file path or name used by the application, potentially causing the system to access or modify unintended files. In this case, the flaw allows an unauthenticated attacker to escalate privileges by sending specially crafted network requests that manipulate file paths within the Mail feature. The vulnerability has a CVSS v3.1 base score of 9.6, reflecting its critical nature with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component, and it impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). Although no public exploits are currently known, the vulnerability's characteristics make it a prime target for attackers seeking to gain elevated access on affected systems. The lack of authentication requirement combined with network accessibility increases the risk of widespread exploitation. The vulnerability was reserved on March 6, 2026, and published on March 11, 2026, with no patch links currently available, emphasizing the urgency for Zoom Communications to release a fix and for organizations to apply mitigations.
Potential Impact
The impact of CVE-2026-30903 is severe for organizations using vulnerable versions of Zoom Workplace on Windows. Successful exploitation allows attackers to escalate privileges without authentication, potentially gaining administrative control over affected systems. This can lead to unauthorized access to sensitive communications, data theft, manipulation or deletion of critical files, and disruption of business operations. The vulnerability affects confidentiality, integrity, and availability simultaneously, increasing the risk of data breaches and operational downtime. Given Zoom Workplace's role in enterprise communication and collaboration, exploitation could compromise internal communications, expose intellectual property, and facilitate lateral movement within networks. The network-based attack vector means attackers can exploit this vulnerability remotely, increasing the threat surface. Organizations lacking timely patching or mitigations may face significant operational and reputational damage, especially in sectors where secure communication is critical.
Mitigation Recommendations
To mitigate CVE-2026-30903, organizations should immediately upgrade Zoom Workplace for Windows to version 6.6.0 or later once available. Until patches are released, restrict network access to the Mail feature by implementing network segmentation and firewall rules that limit inbound traffic to trusted sources. Employ application whitelisting and endpoint protection solutions to detect and block suspicious file path manipulations. Monitor logs and network traffic for unusual activity related to file operations within Zoom Workplace. Educate users about the risk of interacting with unexpected or suspicious communications within the Mail feature to reduce the likelihood of user interaction exploitation. Coordinate with Zoom Communications for timely updates and advisories. Additionally, consider deploying intrusion detection systems (IDS) with signatures tailored to detect exploitation attempts targeting this vulnerability. Regularly review and update incident response plans to address potential exploitation scenarios involving privilege escalation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Zoom
- Date Reserved
- 2026-03-06T18:44:57.631Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b186eb2f860ef9431291cd
Added to database: 3/11/2026, 3:14:51 PM
Last enriched: 3/18/2026, 7:26:20 PM
Last updated: 4/25/2026, 10:04:03 PM
Views: 1267
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.