Zoom Chrome Extension Chrome extension icon

Zoom Chrome Extension

🔍 Security Report Available
👥 8M+ users
📦 v1.9.11
💾 292KiB
📅 2026-02-10
View on Chrome Web Store

Chrome will indicate if you already have this installed.

Lets you schedule Zoom meetings directly from Google Calendar, streamlining your meeting planning and saving time for busy professionals and teams.

Overview

Schedule Zoom cloud meetings directly from Google Calendar

Zoom, the cloud meeting company, unifies mobile collaboration, cloud video conferencing and simple online meetings into one easy-to-use platform. Our solution offers the best video, audio and screen-sharing experience across Windows PC, Mac, iOS, Android and H.323/SIP room systems

The Zoom Chrome Extension allows participants to schedule Zoom cloud meetings directly from Google Calendar. With the click of a button, you can start an instant meeting or schedule a future meeting. The meeting URL and information is sent via a Google Calendar invitation so the attendee can join with a single-click.

Zoom Chrome Extension allows you to:
• Start an instant meeting
• Schedule a meeting
• Schedule a meeting for other

Do we do more?

Zoom offers the following:
• Unparalleled video, voice and screen sharing quality
• Free unlimited minutes for 1-to-1 meetings and 40 minutes for group meetings
• Paid service is only $14.99/month with unlimited minutes and meetings
• Video gallery view to see all 25 video streams at once
• Full online meeting functionality, including desktop and mobile screen sharing
• Annotations and share audio, mouse and keyboard controls
• Free global teleconferencing
• Interoperability between H.323/SIP room systems, desktop, tablet and mobile devices

To learn more about Zoom, please visit <a href="https://zoom.us">https://zoom.us</a>

Tags

Productivity/workflow productivity/workflow

Privacy Practices

Not being sold to third parties, outside of the approved use cases
Not being used or transferred for purposes that are unrelated to the item's core functionality
Not being used or transferred to determine creditworthiness or for lending purposes
✅ Version v1.9.12 was recently scanned.
v1.9.12 Info Scanned Mar 5, 2026

Security Analysis — Zoom Chrome Extension

Analyzed v1.9.12 · Mar 5, 2026 · 10 JS files · 529 KB scanned

Permissions

storage unlimitedStorage https://www.google.com/calendar/* https://calendar.google.com/calendar/* https://*.zoom.us/* https://*.zoom.com/*

Code Patterns Detected

Function constructor used — dynamic code execution Loads external scripts in service worker innerHTML assignment — potential XSS vector String.fromCharCode (obfuscation) charCodeAt (obfuscation) Creates script elements dynamically Monitors storage changes Uses postMessage for cross-origin comms Sets up event listeners

External Connections

www.w3.org calendar.google.com zoom.us support.zoom.com www.zoommildev.com support.zoom.us

Package Contents 43 files · 931KB

📁_locales18KB
📁en3KB
{}messages.json3KB
📁en_US3KB
{}messages.json3KB
📁es_ES4KB
{}messages.json4KB
📁fr_FR4KB
{}messages.json4KB
📁zh_CN4KB
{}messages.json4KB
📁_metadata6KB
{}verified_contents.json6KB
📁css288KB
🎨compstyle.css75KB
🎨content.css65KB
🎨options.css20KB
🎨popup.css19KB
🎨styles.css109KB
📁images70KB
🖼g_w_2.png1KB
🖼header_bg.png579B
🖼icon-128.png16KB
🖼icon-16.png805B
🖼icon-19.png996B
🖼icon-19@2x.png2KB
🖼icon-32.png2KB
🖼icon-48.png4KB
🖼icon.svg3KB
🖼loading.svg2KB
🖼loading_24.gif2KB
🖼loading_gray.svg3KB
🖼loading_white.svg3KB
🖼logo3@2x.png8KB
🖼photo.jpg17KB
🖼select2.png613B
🖼settings_icon.png3KB
📁js529KB
📜background.bundle.js16KB
📜bg-loader.js126B
📜content.bundle.js246KBlarge
📜extinstallcheck.bundle.js207B
📜injectobserver.bundle.js10KB
📜lib.bundle.js107KBlarge
📄lib.bundle.js.LICENSE.txt567B
📜logintransit.bundle.js210B
📜options.bundle.js34KB
📜popup.bundle.js6KB
📜utils.bundle.js110KBlarge
{}manifest.json2KB
🌐options.html10KB
🌐popup.html8KB
📄version.txt166B

What This Extension Does

The Zoom Chrome Extension allows users to schedule Zoom meetings directly from Google Calendar, providing a convenient workflow integration. It solves the problem of easily accessing Zoom's video conferencing features from within Google Calendar. This extension is suitable for individuals and teams who use both Google Calendar and Zoom for their productivity needs.

Permissions Explained

  • storageexpected: This permission allows the extension to store data locally on your device, such as meeting schedules or login credentials.
    Technical: The extension has access to Chrome's storage API, which enables it to save and retrieve data from local storage. This could potentially allow unauthorized access to sensitive information if compromised.
  • unlimitedStorageexpected: This permission allows the extension to store an unlimited amount of data locally on your device, which may be necessary for storing large meeting schedules or other data.
    Technical: The extension has access to Chrome's unlimited storage API, which enables it to save and retrieve a virtually unlimited amount of data from local storage. This could potentially allow unauthorized access to sensitive information if compromised.
  • https://www.google.com/calendar/*expected: This permission allows the extension to interact with Google Calendar, enabling features like scheduling meetings and accessing calendar data.
    Technical: The extension has access to Chrome's permissions API for Google Calendar, which enables it to read and write calendar data. This could potentially allow unauthorized access to sensitive information if compromised.
  • https://calendar.google.com/calendar/*expected: This permission allows the extension to interact with Google Calendar, enabling features like scheduling meetings and accessing calendar data.
    Technical: The extension has access to Chrome's permissions API for Google Calendar, which enables it to read and write calendar data. This could potentially allow unauthorized access to sensitive information if compromised.
  • https://*.zoom.us/*expected: This permission allows the extension to interact with Zoom's services, enabling features like scheduling meetings and accessing meeting data.
    Technical: The extension has access to Chrome's permissions API for Zoom, which enables it to read and write meeting data. This could potentially allow unauthorized access to sensitive information if compromised.
  • https://*.zoom.com/*expected: This permission allows the extension to interact with Zoom's services, enabling features like scheduling meetings and accessing meeting data.
    Technical: The extension has access to Chrome's permissions API for Zoom, which enables it to read and write meeting data. This could potentially allow unauthorized access to sensitive information if compromised.

Your Data

The extension accesses user data from Google Calendar, including calendar events and login credentials. It also sends data to Zoom's servers for meeting scheduling and other features.

Technical Details

The extension contacts the following domains: www.w3.org, calendar.google.com, zoom.us, support.zoom.com, www.zoommildev.com, support.zoom.us. It uses HTTPS protocol for secure communication with these domains.

Code Findings

Function constructor used — dynamic code executionHigh

This finding indicates that the extension uses a function constructor to execute code dynamically, which can potentially lead to security vulnerabilities.

Technical: The extension uses the new Function() constructor to create and execute functions dynamically. This could allow an attacker to inject malicious code if they gain access to the extension's codebase.

💡 This pattern is commonly used in legitimate extensions for dynamic code execution, such as loading external scripts or handling user input.

Loads external scripts in service workerHigh

This finding indicates that the extension loads external scripts in its service worker, which can potentially lead to security vulnerabilities.

Technical: The extension uses the fetch() API to load external scripts from Zoom's servers. This could allow an attacker to inject malicious code if they gain access to the extension's codebase.

💡 This pattern is commonly used in legitimate extensions for loading external resources, such as libraries or APIs.

innerHTML assignment — potential XSS vectorMedium

This finding indicates that the extension uses innerHTML assignments, which can potentially lead to cross-site scripting (XSS) vulnerabilities.

Technical: The extension uses innerHTML assignments to update HTML content in its UI. This could allow an attacker to inject malicious code if they gain access to the extension's codebase and manipulate the innerHTML property.

💡 This pattern is commonly used in legitimate extensions for updating UI content, such as displaying user data or loading external resources.

String.fromCharCode (obfuscation)Medium

This finding indicates that the extension uses String.fromCharCode() to obfuscate code, which can potentially make it harder for security researchers to analyze.

Technical: The extension uses String.fromCharCode() to encode strings in its codebase. This could make it harder for security researchers to understand the extension's behavior and identify potential vulnerabilities.

💡 This pattern is commonly used in legitimate extensions for encoding data, such as user input or API responses.

Creates script elements dynamicallyHigh

This finding indicates that the extension creates script elements dynamically, which can potentially lead to security vulnerabilities.

Technical: The extension uses document.createElement() to create script elements dynamically. This could allow an attacker to inject malicious code if they gain access to the extension's codebase and manipulate the script element's content.

💡 This pattern is commonly used in legitimate extensions for loading external scripts or handling user input.

Monitors storage changesMedium

This finding indicates that the extension monitors storage changes, which can potentially lead to security vulnerabilities if not properly implemented.

Technical: The extension uses chrome.storage.onChanged() to monitor storage changes. This could allow an attacker to inject malicious code if they gain access to the extension's codebase and manipulate the storage API.

💡 This pattern is commonly used in legitimate extensions for storing user data or loading external resources.

Uses postMessage for cross-origin commsMedium

This finding indicates that the extension uses postMessage() to communicate with other origins, which can potentially lead to security vulnerabilities if not properly implemented.

Technical: The extension uses window.postMessage() to send messages to other origins. This could allow an attacker to inject malicious code if they gain access to the extension's codebase and manipulate the message content.

💡 This pattern is commonly used in legitimate extensions for communicating with external APIs or handling user input.

Sets up event listenersInfo

This finding indicates that the extension sets up event listeners, which can potentially be used to handle user interactions and update UI content.

Technical: The extension uses addEventListener() to set up event listeners for various events. This could allow an attacker to inject malicious code if they gain access to the extension's codebase and manipulate the event listener's behavior.

💡 This pattern is commonly used in legitimate extensions for handling user interactions and updating UI content.

Bottom Line

The Zoom Chrome Extension has several security concerns, including dynamic code execution, external script loading, and potential XSS vulnerabilities. While these findings are concerning, they do not necessarily indicate malicious intent. Users should exercise caution when installing and using this extension, especially if they handle sensitive data or interact with other extensions that may have security vulnerabilities.

Do more in Google Chrome with Adobe Acrobat PDF tools. View, fill, comment, sign, and try convert and compress tools.
Productivity/workflow
Block ads on YouTube and your favorite sites for free
Productivity/workflow
Remove ads on YouTube and everywhere else you browse.
Productivity/workflow