CVE-2026-30662

ConcreteCMS v9.4.7 contains a Denial of Service (DoS) vulnerability in the File Manager component. The 'download' method in 'concrete/controllers/backend/file.php' improperly manages memory when creating zip archives. It uses 'ZipArchive::addFromString' combined with 'file_get_contents', which loads the entire content of every selected file into PHP memory. An authenticated attacker can exploit this by requesting a bulk download of large files, triggering an Out-Of-Memory (OOM) condition that causes the PHP-FPM process to terminate (SIGSEGV) and the web server to return a 500 error.
References
Link Resource
https://wang1rrr.github.io/2026/02/11/CVE-Report-ConcreteCMS-DoS/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:concretecms:concrete_cms:9.4.7:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-24 15:16

Updated : 2026-03-24 20:16


NVD link : CVE-2026-30662

Mitre link : CVE-2026-30662

CVE.ORG link : CVE-2026-30662


JSON object : View

Products Affected

concretecms

  • concrete_cms
CWE
CWE-400

Uncontrolled Resource Consumption