Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30662: n/a

0
Medium
VulnerabilityCVE-2026-30662cvecve-2026-30662
Published: Tue Mar 24 2026 (03/24/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

ConcreteCMS v9.4.7 contains a Denial of Service (DoS) vulnerability in the File Manager component. The 'download' method in 'concrete/controllers/backend/file.php' improperly manages memory when creating zip archives. It uses 'ZipArchive::addFromString' combined with 'file_get_contents', which loads the entire content of every selected file into PHP memory. An authenticated attacker can exploit this by requesting a bulk download of large files, triggering an Out-Of-Memory (OOM) condition that causes the PHP-FPM process to terminate (SIGSEGV) and the web server to return a 500 error.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 15:06:45 UTC

Technical Analysis

CVE-2026-30662 is a Denial of Service vulnerability identified in ConcreteCMS version 9.4.7, specifically within the File Manager component's 'download' method located in 'concrete/controllers/backend/file.php'. The vulnerability is due to improper memory management when generating zip archives for bulk file downloads. The method uses PHP's ZipArchive::addFromString combined with file_get_contents to add files to the archive, which loads the entire content of each selected file into PHP memory. When an authenticated attacker requests a bulk download of large files, this can exhaust the PHP memory limit, causing the PHP-FPM process to terminate unexpectedly with a segmentation fault (SIGSEGV). This results in the web server returning a 500 Internal Server Error, effectively causing a denial of service by disrupting the availability of the affected web application. The vulnerability requires the attacker to be authenticated, which limits exposure to some extent, but does not require further user interaction. No CVSS score has been assigned yet, and no public exploits have been reported. The root cause is inefficient handling of file data in memory during zip archive creation, which can be exploited to trigger an out-of-memory condition.

Potential Impact

The primary impact of CVE-2026-30662 is denial of service, which affects the availability of ConcreteCMS-based websites running version 9.4.7. Successful exploitation causes the PHP-FPM process to crash, leading to 500 Internal Server Errors and potentially making the website or web application unavailable to legitimate users. This can disrupt business operations, especially for organizations relying on ConcreteCMS for content management and file distribution. Repeated exploitation could lead to sustained downtime or require manual intervention to restart services. While the vulnerability does not directly compromise confidentiality or integrity, the loss of availability can have significant operational and reputational consequences. Since exploitation requires authentication, the risk is somewhat mitigated by access controls, but insider threats or compromised accounts could still trigger the attack. The lack of a patch or workaround increases the urgency for organizations to implement mitigations. The scope is limited to ConcreteCMS installations using the vulnerable File Manager component, but given ConcreteCMS's usage in various sectors, the impact can be widespread.

Mitigation Recommendations

To mitigate CVE-2026-30662, organizations should first restrict bulk download functionality to trusted users and limit the number and size of files that can be downloaded simultaneously to prevent excessive memory consumption. Implement server-side controls to enforce maximum memory usage for PHP processes, such as adjusting 'memory_limit' in php.ini and configuring PHP-FPM process management to recycle processes proactively. Monitor PHP-FPM logs and server error logs for signs of memory exhaustion or segmentation faults to detect attempted exploitation. If possible, update ConcreteCMS to a patched version once available or apply custom patches to modify the 'download' method to stream files rather than loading entire contents into memory. Employ web application firewalls (WAFs) to detect and block abnormal bulk download requests. Additionally, enforce strong authentication and session management to reduce the risk of unauthorized exploitation. Regularly back up website data and have incident response plans ready to restore service quickly in case of disruption.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-03-04T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c2a3a3f4197a8e3b3ed94a

Added to database: 3/24/2026, 2:45:55 PM

Last enriched: 3/24/2026, 3:06:45 PM

Last updated: 3/26/2026, 5:36:12 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses