Description
The Zoom Client for Meetings (for Android, iOS, Linux, MacOS, and Windows) before version 5.10.0 failed to properly parse XML stanzas in XMPP messages. This can allow a malicious user to break out of the current XMPP message context and create a new message context to have the receiving users client perform a variety of actions.This issue could be used in a more sophisticated attack to forge XMPP messages from the server.
Problem types
Improper Input Validation
Product status
Credits
Ivan Fratric of Google Project Zero
References
explore.zoom.us/en/trust/security/security-bulletin
explore.zoom.us/en/trust/security/security-bulletin
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.