Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25236: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in pear pearweb

0
Medium
VulnerabilityCVE-2026-25236cvecve-2026-25236cwe-89
Published: Tue Feb 03 2026 (02/03/2026, 18:29:46 UTC)
Source: CVE Database V5
Vendor/Project: pear
Product: pearweb

Description

PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, a SQL injection risk exists in karma queries due to unsafe literal substitution for an IN (...) list. This issue has been patched in version 1.33.0.

AI-Powered Analysis

AILast updated: 02/03/2026, 19:16:47 UTC

Technical Analysis

CVE-2026-25236 is a SQL injection vulnerability identified in the pearweb component of the PEAR PHP framework, specifically affecting versions prior to 1.33.0. The vulnerability stems from improper neutralization of special elements in SQL commands (CWE-89), where unsafe literal substitution is used in constructing SQL queries for karma-related data, particularly within an IN (...) list clause. This unsafe coding practice allows an unauthenticated attacker to inject arbitrary SQL commands remotely without user interaction, potentially leading to unauthorized data access or modification. The vulnerability does not require privileges or user interaction, making it easier to exploit. The CVSS v4.0 base score is 6.9, indicating a medium severity level, with network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality and integrity. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to applications relying on pearweb for PHP component management and distribution. The issue has been addressed and patched in pearweb version 1.33.0, and users are strongly advised to upgrade. The vulnerability highlights the importance of using parameterized queries and proper input sanitization to prevent SQL injection attacks in PHP applications.

Potential Impact

For European organizations, the impact of CVE-2026-25236 can be significant if pearweb is integrated into their PHP development or deployment environments. Successful exploitation could allow attackers to execute arbitrary SQL commands, leading to unauthorized data disclosure, data manipulation, or corruption within affected systems. This compromises data confidentiality and integrity, potentially affecting sensitive business or user information. The vulnerability's remote exploitability without authentication increases the risk of widespread attacks, especially in web-facing applications. Organizations relying on pearweb for package management or internal tools may face operational disruptions or reputational damage if exploited. Although availability impact is not indicated, data integrity and confidentiality breaches could trigger compliance issues under GDPR and other European data protection regulations. The medium severity score suggests a moderate but actionable risk that should be addressed promptly to avoid escalation or chaining with other vulnerabilities.

Mitigation Recommendations

1. Upgrade pearweb to version 1.33.0 or later immediately to apply the official patch addressing the SQL injection vulnerability. 2. Conduct a thorough code audit of all PHP applications using pearweb components to identify and remediate any unsafe SQL query constructions, especially those involving dynamic IN (...) lists or literal substitutions. 3. Implement parameterized queries or prepared statements consistently across all database interactions to prevent injection attacks. 4. Employ Web Application Firewalls (WAFs) with SQL injection detection rules tailored to detect and block suspicious query patterns related to pearweb usage. 5. Monitor application logs and database access patterns for unusual or anomalous queries that could indicate exploitation attempts. 6. Educate development teams on secure coding practices focusing on input validation and sanitization to prevent similar vulnerabilities. 7. Review and tighten database user permissions to limit the potential damage of any successful injection attack. 8. If upgrading immediately is not feasible, consider temporarily disabling or restricting access to vulnerable pearweb functionalities until patched.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-30T14:44:47.328Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698245baf9fa50a62fda11e4

Added to database: 2/3/2026, 7:00:10 PM

Last enriched: 2/3/2026, 7:16:47 PM

Last updated: 2/7/2026, 12:00:48 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats