Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25234: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in pear pearweb

0
Medium
VulnerabilityCVE-2026-25234cvecve-2026-25234cwe-89
Published: Tue Feb 03 2026 (02/03/2026, 18:29:19 UTC)
Source: CVE Database V5
Vendor/Project: pear
Product: pearweb

Description

PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, a SQL injection vulnerability in category deletion can allow an attacker with access to the category manager workflow to inject SQL via a category id. This issue has been patched in version 1.33.0.

AI-Powered Analysis

AILast updated: 02/03/2026, 19:16:59 UTC

Technical Analysis

CVE-2026-25234 is an SQL injection vulnerability classified under CWE-89, found in the pearweb component of the PEAR PHP framework. The flaw exists in the category deletion workflow, where the category ID parameter is improperly sanitized, allowing an attacker with access to the category manager to inject arbitrary SQL commands. This vulnerability arises due to improper neutralization of special elements in SQL commands, enabling manipulation of backend database queries. The vulnerability affects all pearweb versions prior to 1.33.0 and has been addressed in that release. The CVSS v4.0 base score is 5.3, indicating medium severity, with an attack vector of network, low attack complexity, no privileges required beyond category manager access, no user interaction, and limited impact on integrity. Exploitation could allow unauthorized data modification or disclosure, potentially compromising the confidentiality and integrity of the affected system's data. No public exploits have been reported, but the vulnerability poses a risk to any deployment using vulnerable versions. The patch involves proper input validation and use of parameterized queries to prevent SQL injection. Organizations should update to version 1.33.0 or later to remediate this issue.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized access or manipulation of sensitive data stored in databases managed via pearweb. The SQL injection could allow attackers to extract confidential information, alter or delete data, or escalate privileges if combined with other vulnerabilities. This undermines data integrity and confidentiality, potentially violating GDPR and other data protection regulations. The requirement for category manager access limits the attack surface but insider threats or compromised credentials could facilitate exploitation. Organizations relying on pearweb for content or category management in PHP environments are at risk, especially if they have not applied the patch. The impact extends to operational disruption if database integrity is compromised. Given the medium severity and no known active exploitation, the immediate risk is moderate but warrants prompt remediation to avoid potential data breaches and compliance issues.

Mitigation Recommendations

1. Upgrade pearweb to version 1.33.0 or later immediately to apply the official patch addressing the SQL injection vulnerability. 2. Restrict access to the category manager workflow strictly to trusted and authenticated users, employing role-based access controls and multi-factor authentication where possible. 3. Implement additional input validation and sanitization on all user-supplied inputs, especially those interacting with database queries. 4. Use parameterized queries or prepared statements in any custom code interfacing with the database to prevent injection attacks. 5. Monitor logs for unusual database query patterns or access attempts to the category manager interface. 6. Conduct regular security audits and vulnerability scans on PHP-based web applications to detect similar injection flaws. 7. Educate developers and administrators about secure coding practices and the risks of SQL injection. 8. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block SQL injection attempts targeting pearweb endpoints.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-30T14:44:47.328Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698245baf9fa50a62fda11de

Added to database: 2/3/2026, 7:00:10 PM

Last enriched: 2/3/2026, 7:16:59 PM

Last updated: 2/5/2026, 12:02:55 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats