CVE-2025-30662
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-11-13
Last updated on: 2025-11-13
Assigner: Zoom Video Communications, Inc.
Description
Description
Symlink following in the installer for the Zoom Workplace VDI Plugin macOS Universal installer before version 6.3.14, 6.4.14, and 6.5.10 in their respective tracks may allow an authenticated user to conduct a disclosure of information via network access.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| zoom | workplace_vdi_plugin | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-646 | The product allows a file to be uploaded, but it relies on the file name or extension of the file to determine the appropriate behaviors. This could be used by attackers to cause the file to be misclassified and processed in a dangerous fashion. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves symlink following in the installer for the Zoom Workplace VDI Plugin on macOS Universal versions before 6.3.14, 6.4.14, and 6.5.10. It may allow an authenticated user to disclose information via network access by exploiting the installerβs handling of symbolic links.
How can this vulnerability impact me? :
An authenticated user could exploit this vulnerability to disclose sensitive information over the network, potentially leading to unauthorized access to confidential data.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70