Description
The Video Conferencing with Zoom WordPress plugin before 4.6.6 contains an AJAX handler that has its nonce verification commented out, allowing unauthenticated attackers to generate valid Zoom SDK signatures for any meeting ID and retrieve the site's Zoom SDK key.
Published: 2026-02-18
Score: 7.5 High
EPSS: 32.9% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the Video Conferencing with Zoom WordPress plugin before version 4.6.6. An AJAX handler used to generate Zoom SDK signatures has its nonce verification commented out, permitting unauthenticated attackers to craft valid signatures for any meeting ID and to retrieve the site's Zoom SDK key. This authentication bypass allows an attacker to create or join Zoom meetings as a host or participant without authorization and to expose confidential SDK keys that could be reused for further attacks.

Affected Systems

The affected product is the WordPress plugin Video Conferencing with Zoom, all releases prior to version 4.6.6. No specific vendor name is identified beyond the plugin; the vulnerability applies to any site running the affected plugin version.

Risk and Exploitability

The CVSS score is 7.5, indicating high severity. EPSS score is 33%, indicating a moderate probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a remote unauthenticated web request to the exposed AJAX endpoint, which can be triggered via a simple HTTP call. An attacker only needs the meeting ID and has no authentication credentials, making exploitation straightforward. If successful, the attacker could gain the Zoom SDK key and generate valid meeting invitations, potentially undermining confidentiality, integrity, and availability of the host and participants.

Generated by OpenCVE AI on May 2, 2026 at 00:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the WordPress plugin to version 4.6.6 or later to restore proper nonce verification and block unauthenticated signature generation.
  • If updating immediately is not feasible, restrict access to the AJAX signature‑generation endpoint—either by disabling the endpoint in the plugin settings or using server‑side rules such as .htaccess to block all requests except from trusted IPs.
  • Deploy a web application firewall rule that filters or blocks unauthenticated traffic to the SDK signature endpoint and logs any attempts to generate signatures without a valid nonce.
  • Monitor web server logs for unexpected SDK signature requests consistent with the vulnerability pattern.

Generated by OpenCVE AI on May 2, 2026 at 00:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-287
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Video Conferencing With Zoom Project
Video Conferencing With Zoom Project video Conferencing With Zoom
Wordpress
Wordpress wordpress
Vendors & Products Video Conferencing With Zoom Project
Video Conferencing With Zoom Project video Conferencing With Zoom
Wordpress
Wordpress wordpress

Wed, 18 Feb 2026 06:15:00 +0000

Type Values Removed Values Added
Description The Video Conferencing with Zoom WordPress plugin before 4.6.6 contains an AJAX handler that has its nonce verification commented out, allowing unauthenticated attackers to generate valid Zoom SDK signatures for any meeting ID and retrieve the site's Zoom SDK key.
Title Video Conferencing with Zoom API < 4.6.6 - Unauthenticated SDK Signature Generation
References

Subscriptions

Video Conferencing With Zoom Project Video Conferencing With Zoom
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2026-02-18T14:02:28.900Z

Reserved: 2026-01-23T13:19:23.260Z

Link: CVE-2026-1368

cve-icon Vulnrichment

Updated: 2026-02-18T14:02:24.328Z

cve-icon NVD

Status : Deferred

Published: 2026-02-18T06:16:34.327

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1368

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T01:00:15Z

Weaknesses