CVE-2026-30662
Awaiting Analysis Awaiting Analysis - Queue
Denial of Service in ConcreteCMS File Manager via Memory Exhaustion

Publication date: 2026-03-24

Last updated on: 2026-03-24

Assigner: MITRE

Description
ConcreteCMS v9.4.7 contains a Denial of Service (DoS) vulnerability in the File Manager component. The 'download' method in 'concrete/controllers/backend/file.php' improperly manages memory when creating zip archives. It uses 'ZipArchive::addFromString' combined with 'file_get_contents', which loads the entire content of every selected file into PHP memory. An authenticated attacker can exploit this by requesting a bulk download of large files, triggering an Out-Of-Memory (OOM) condition that causes the PHP-FPM process to terminate (SIGSEGV) and the web server to return a 500 error.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-24
Last Modified
2026-03-24
Generated
2026-05-07
AI Q&A
2026-03-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
concretecms concrete_cms 9.4.7
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-400 The product does not properly control the allocation and maintenance of a limited resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in ConcreteCMS version 9.4.7 within its File Manager component. Specifically, the 'download' method in the file 'concrete/controllers/backend/file.php' improperly manages memory when creating zip archives. It uses the 'ZipArchive::addFromString' function combined with 'file_get_contents', which loads the entire content of every selected file into PHP memory.

An authenticated attacker can exploit this by requesting a bulk download of large files, causing the system to run out of memory (Out-Of-Memory condition). This leads to the PHP-FPM process terminating unexpectedly (SIGSEGV), and the web server responds with a 500 error.


How can this vulnerability impact me? :

The impact of this vulnerability is a Denial of Service (DoS) condition. An attacker with authentication can cause the web server to crash or become unresponsive by triggering an Out-Of-Memory condition through bulk downloading large files.

This results in the PHP-FPM process terminating and the server returning 500 errors, which disrupts normal service availability and can affect users' ability to access or use the File Manager component.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart