PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, use of preg_replace() with the /e modifier in bug update email handling can enable PHP code execution if attacker-controlled content reaches the evaluated replacement. This issue has been patched in version 1.33.0.
References
| Link | Resource |
|---|---|
| https://github.com/pear/pearweb/security/advisories/GHSA-vhw6-hqh9-8r23 | Vendor Advisory |
Configurations
History
05 Feb 2026, 18:05
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:pear:pearweb:*:*:*:*:*:*:*:* | |
| References | () https://github.com/pear/pearweb/security/advisories/GHSA-vhw6-hqh9-8r23 - Vendor Advisory | |
| First Time |
Pear
Pear pearweb |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
03 Feb 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-03 19:16
Updated : 2026-02-05 18:05
NVD link : CVE-2026-25237
Mitre link : CVE-2026-25237
CVE.ORG link : CVE-2026-25237
JSON object : View
Products Affected
pear
- pearweb
CWE
CWE-624
Executable Regular Expression Error
