CVE-2026-25240

PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, a SQL injection vulnerability can occur in user::maintains() when role filters are provided as an array and interpolated into an IN (...) clause. This issue has been patched in version 1.33.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pear:pearweb:*:*:*:*:*:*:*:*

History

05 Feb 2026, 17:56

Type Values Removed Values Added
References () https://github.com/pear/pearweb/security/advisories/GHSA-xw9g-5gr2-c44f - () https://github.com/pear/pearweb/security/advisories/GHSA-xw9g-5gr2-c44f - Vendor Advisory
First Time Pear
Pear pearweb
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:pear:pearweb:*:*:*:*:*:*:*:*

03 Feb 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-03 19:16

Updated : 2026-02-05 17:56


NVD link : CVE-2026-25240

Mitre link : CVE-2026-25240

CVE.ORG link : CVE-2026-25240


JSON object : View

Products Affected

pear

  • pearweb
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')