Attackers can leverage the flaw by convincing users to open a file purported to be a recording of a past WebEx event.
Source: Threadpost