ConcreteCMS v9.4.7 contains a Denial of Service (DoS) vulnerability in the File Manager component. The 'download' method in 'concrete/controllers/backend/file.php' improperly manages memory when creating zip archives. It uses 'ZipArchive::addFromString' combined with 'file_get_contents', which loads the entire content of every selected file into PHP memory. An authenticated attacker can exploit this by requesting a bulk download of large files, triggering an Out-Of-Memory (OOM) condition that causes the PHP-FPM process to terminate (SIGSEGV) and the web server to return a 500 error.
References
| Link | Resource |
|---|---|
| https://wang1rrr.github.io/2026/02/11/CVE-Report-ConcreteCMS-DoS/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-24 15:16
Updated : 2026-03-24 20:16
NVD link : CVE-2026-30662
Mitre link : CVE-2026-30662
CVE.ORG link : CVE-2026-30662
JSON object : View
Products Affected
concretecms
- concrete_cms
CWE
CWE-400
Uncontrolled Resource Consumption
