VYPR
Moderate severityNVD Advisory· Published Oct 21, 2025· Updated Oct 27, 2025

CVE-2025-60790

CVE-2025-60790

Description

ProcessWire CMS 3.0.246 allows a low-privileged user with lang-edit to upload a crafted ZIP to Language Support that is auto-extracted without limits prior to validation, enabling resource-exhaustion Denial of Service.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

ProcessWire CMS 3.0.246 allows low-privileged users with lang-edit to upload a crafted ZIP that is extracted without limits, causing resource-exhaustion denial of service.

Vulnerability

Details

ProcessWire CMS 3.0.246 contains a denial-of-service vulnerability in its archive handling. The core issue lies in WireFileTools::unzip(), which extracts user-supplied ZIP archives before any validation and without resource limits. Specifically, WireUpload::saveUploadZip() writes uploaded archives to a temporary directory and immediately calls unzip(), which iterates all ZIP entries and extracts them using ZipArchive::extractTo(). The only guard is a check for .. in entry names; there are no limits on total uncompressed size, number of entries, directory depth, or extraction time [1][3][4].

Exploitation

The attack surface is accessible to low-privileged users with the lang-edit permission. These users can upload ZIP files through the Language Support file fields (e.g., Core Translation Files or Site Translation Files) under Setup → Languages. The uploaded ZIP is automatically extracted without any pre-validation. An attacker can craft a ZIP bomb—a small archive that expands to gigabytes of data—causing resource exhaustion on the server's CPU and disk [3][4].

Impact

Successful exploitation leads to a denial-of-service condition due to resource exhaustion. The CVSS score is 6.5 (Medium) with vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating no confidentiality or integrity impact but high availability impact [1]. No authentication bypass or data access is achieved; the attack solely disrupts service.

Mitigation

As of the publication date, no official patch has been released for ProcessWire 3.0.246. The issue is documented in the project's issue tracker [4]. Administrators are advised to restrict the lang-edit permission to trusted users only or to disable ZIP uploads in Language Support if not required. The vendor may address this in a future release.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
processwire/processwirePackagist
<= 3.0.246

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.