CVE-2026-25234: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in pear pearweb
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, a SQL injection vulnerability in category deletion can allow an attacker with access to the category manager workflow to inject SQL via a category id. This issue has been patched in version 1.33.0.
AI Analysis
Technical Summary
CVE-2026-25234 is an SQL injection vulnerability classified under CWE-89, found in the pearweb component of the PEAR PHP framework. The flaw exists in the category deletion workflow, where the category ID parameter is improperly sanitized, allowing an attacker with access to the category manager to inject arbitrary SQL commands. This vulnerability arises due to improper neutralization of special elements in SQL commands, enabling manipulation of backend database queries. The vulnerability affects all pearweb versions prior to 1.33.0 and has been addressed in that release. The CVSS v4.0 base score is 5.3, indicating medium severity, with an attack vector of network, low attack complexity, no privileges required beyond category manager access, no user interaction, and limited impact on integrity. Exploitation could allow unauthorized data modification or disclosure, potentially compromising the confidentiality and integrity of the affected system's data. No public exploits have been reported, but the vulnerability poses a risk to any deployment using vulnerable versions. The patch involves proper input validation and use of parameterized queries to prevent SQL injection. Organizations should update to version 1.33.0 or later to remediate this issue.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access or manipulation of sensitive data stored in databases managed via pearweb. The SQL injection could allow attackers to extract confidential information, alter or delete data, or escalate privileges if combined with other vulnerabilities. This undermines data integrity and confidentiality, potentially violating GDPR and other data protection regulations. The requirement for category manager access limits the attack surface but insider threats or compromised credentials could facilitate exploitation. Organizations relying on pearweb for content or category management in PHP environments are at risk, especially if they have not applied the patch. The impact extends to operational disruption if database integrity is compromised. Given the medium severity and no known active exploitation, the immediate risk is moderate but warrants prompt remediation to avoid potential data breaches and compliance issues.
Mitigation Recommendations
1. Upgrade pearweb to version 1.33.0 or later immediately to apply the official patch addressing the SQL injection vulnerability. 2. Restrict access to the category manager workflow strictly to trusted and authenticated users, employing role-based access controls and multi-factor authentication where possible. 3. Implement additional input validation and sanitization on all user-supplied inputs, especially those interacting with database queries. 4. Use parameterized queries or prepared statements in any custom code interfacing with the database to prevent injection attacks. 5. Monitor logs for unusual database query patterns or access attempts to the category manager interface. 6. Conduct regular security audits and vulnerability scans on PHP-based web applications to detect similar injection flaws. 7. Educate developers and administrators about secure coding practices and the risks of SQL injection. 8. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block SQL injection attempts targeting pearweb endpoints.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-25234: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in pear pearweb
Description
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, a SQL injection vulnerability in category deletion can allow an attacker with access to the category manager workflow to inject SQL via a category id. This issue has been patched in version 1.33.0.
AI-Powered Analysis
Technical Analysis
CVE-2026-25234 is an SQL injection vulnerability classified under CWE-89, found in the pearweb component of the PEAR PHP framework. The flaw exists in the category deletion workflow, where the category ID parameter is improperly sanitized, allowing an attacker with access to the category manager to inject arbitrary SQL commands. This vulnerability arises due to improper neutralization of special elements in SQL commands, enabling manipulation of backend database queries. The vulnerability affects all pearweb versions prior to 1.33.0 and has been addressed in that release. The CVSS v4.0 base score is 5.3, indicating medium severity, with an attack vector of network, low attack complexity, no privileges required beyond category manager access, no user interaction, and limited impact on integrity. Exploitation could allow unauthorized data modification or disclosure, potentially compromising the confidentiality and integrity of the affected system's data. No public exploits have been reported, but the vulnerability poses a risk to any deployment using vulnerable versions. The patch involves proper input validation and use of parameterized queries to prevent SQL injection. Organizations should update to version 1.33.0 or later to remediate this issue.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access or manipulation of sensitive data stored in databases managed via pearweb. The SQL injection could allow attackers to extract confidential information, alter or delete data, or escalate privileges if combined with other vulnerabilities. This undermines data integrity and confidentiality, potentially violating GDPR and other data protection regulations. The requirement for category manager access limits the attack surface but insider threats or compromised credentials could facilitate exploitation. Organizations relying on pearweb for content or category management in PHP environments are at risk, especially if they have not applied the patch. The impact extends to operational disruption if database integrity is compromised. Given the medium severity and no known active exploitation, the immediate risk is moderate but warrants prompt remediation to avoid potential data breaches and compliance issues.
Mitigation Recommendations
1. Upgrade pearweb to version 1.33.0 or later immediately to apply the official patch addressing the SQL injection vulnerability. 2. Restrict access to the category manager workflow strictly to trusted and authenticated users, employing role-based access controls and multi-factor authentication where possible. 3. Implement additional input validation and sanitization on all user-supplied inputs, especially those interacting with database queries. 4. Use parameterized queries or prepared statements in any custom code interfacing with the database to prevent injection attacks. 5. Monitor logs for unusual database query patterns or access attempts to the category manager interface. 6. Conduct regular security audits and vulnerability scans on PHP-based web applications to detect similar injection flaws. 7. Educate developers and administrators about secure coding practices and the risks of SQL injection. 8. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block SQL injection attempts targeting pearweb endpoints.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-30T14:44:47.328Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698245baf9fa50a62fda11de
Added to database: 2/3/2026, 7:00:10 PM
Last enriched: 2/3/2026, 7:16:59 PM
Last updated: 2/5/2026, 12:02:55 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23572: CWE-863 Incorrect Authorization in TeamViewer Remote
HighCVE-2026-1966: CWE-522 Insufficiently Protected Credentials in YugabyteDB Inc YugabyteDB Anywhere
LowCVE-2026-23797: CWE-256 Plaintext Storage of a Password in OpenSolution Quick.Cart
MediumCVE-2026-23796: CWE-384 Session Fixation in OpenSolution Quick.Cart
MediumCVE-2026-1654: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pkthree Peter’s Date Countdown
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.