CVE-2025-60790
Description
ProcessWire CMS 3.0.246 allows a low-privileged user with lang-edit to upload a crafted ZIP to Language Support that is auto-extracted without limits prior to validation, enabling resource-exhaustion Denial of Service.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
ProcessWire CMS 3.0.246 allows low-privileged users with lang-edit to upload a crafted ZIP that is extracted without limits, causing resource-exhaustion denial of service.
Vulnerability
Details
ProcessWire CMS 3.0.246 contains a denial-of-service vulnerability in its archive handling. The core issue lies in WireFileTools::unzip(), which extracts user-supplied ZIP archives before any validation and without resource limits. Specifically, WireUpload::saveUploadZip() writes uploaded archives to a temporary directory and immediately calls unzip(), which iterates all ZIP entries and extracts them using ZipArchive::extractTo(). The only guard is a check for .. in entry names; there are no limits on total uncompressed size, number of entries, directory depth, or extraction time [1][3][4].
Exploitation
The attack surface is accessible to low-privileged users with the lang-edit permission. These users can upload ZIP files through the Language Support file fields (e.g., Core Translation Files or Site Translation Files) under Setup → Languages. The uploaded ZIP is automatically extracted without any pre-validation. An attacker can craft a ZIP bomb—a small archive that expands to gigabytes of data—causing resource exhaustion on the server's CPU and disk [3][4].
Impact
Successful exploitation leads to a denial-of-service condition due to resource exhaustion. The CVSS score is 6.5 (Medium) with vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating no confidentiality or integrity impact but high availability impact [1]. No authentication bypass or data access is achieved; the attack solely disrupts service.
Mitigation
As of the publication date, no official patch has been released for ProcessWire 3.0.246. The issue is documented in the project's issue tracker [4]. Administrators are advised to restrict the lang-edit permission to trusted users only or to disable ZIP uploads in Language Support if not required. The vendor may address this in a future release.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
processwire/processwirePackagist | <= 3.0.246 | — |
Affected products
2- ProcessWire/ProcessWire CMSdescription
- Range: =3.0.246
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.