Sadly, the answers to this question are out of date and therefore incorrect.
Even user 'ctuffli' claims that the short answer is 'no' while providing a possible way afterwards. It is indeed possible and rather easy to eavesdrop if you are already authenticated inside a WPA/WPA2-PSK wireless network.
Although every wireless client uses individual session keys with the access point (AP), it is possible to perform a de-authentication attack against such a client, which leads to it repeating it's 4-way-handshake with the AP. If this handshake is successfully captured, the attacker can eavesdrop on the data transmitted between victim and AP.
Please note that such an attack is also depending on physical factors, such as the locations of AP, victim and attacker device and may become more difficult through beamforming. Moreover, you need a WIFI adapter that can be put into monitoring mode, which not every model provides.
This attack is inside the standard hacking repertoire and may easily be conducted with tools such as wireshark or aircrack-ng.
Similar questions were posted here and here, where the latter one luckily contains an answer with an update to these circumstances.