I feel I have to clear this up because a lot of people are confused and/or think this is some exploit or previously unknown major security hole in MacOS.
The Zoom installer was not in any way bypassing permissions.
If you're an administrator on your Mac, you're in the "admin" UNIX group. Look at the permissions on the Applications folder:
drwxrwxr-x+ 56 root admin 1792 Apr 1 09:55 /Applications/
The middle rwx is group permissions. Notice the directory's group is set to "admin". Thus you, as an admin user, can write there without any further authentication or authorization. Thus the installer is able to write the app bundle to that directory.
The worst you can really call this is a security weakness in the default configuration of MacOS. The Applications folder probably shouldn't be group-writeable by admin users by default. You should HAVE to authenticate (either with sudo, or the installer asks for your password) to write there. But MacOS lets admins write freely to /Applications without authenticating. Any app can take advantage of that; apps that are distributed as dmg files already do, when you drag the app to /Applications.