CVE-2026-25241

PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, an unauthenticated SQL injection in the /get/<package>/<version> endpoint allows remote attackers to execute arbitrary SQL via a crafted package version. This issue has been patched in version 1.33.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pear:pearweb:*:*:*:*:*:*:*:*

History

05 Feb 2026, 17:55

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:pear:pearweb:*:*:*:*:*:*:*:*
First Time Pear
Pear pearweb
References () https://github.com/pear/pearweb/security/advisories/GHSA-63fv-vpq5-gv8p - () https://github.com/pear/pearweb/security/advisories/GHSA-63fv-vpq5-gv8p - Vendor Advisory

03 Feb 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-03 19:16

Updated : 2026-02-05 17:55


NVD link : CVE-2026-25241

Mitre link : CVE-2026-25241

CVE.ORG link : CVE-2026-25241


JSON object : View

Products Affected

pear

  • pearweb
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')