CVE-2026-25237: CWE-624: Executable Regular Expression Error in pear pearweb
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, use of preg_replace() with the /e modifier in bug update email handling can enable PHP code execution if attacker-controlled content reaches the evaluated replacement. This issue has been patched in version 1.33.0.
AI Analysis
Technical Summary
CVE-2026-25237 is a critical vulnerability identified in pearweb, a component of the PEAR PHP framework used for reusable PHP components. The vulnerability stems from the use of the preg_replace() function with the deprecated /e modifier in the handling of bug update emails. The /e modifier causes the replacement string to be evaluated as PHP code, which, if attacker-controlled input reaches this evaluated replacement, allows for arbitrary PHP code execution on the server. This flaw exists in pearweb versions prior to 1.33.0 and has been patched in that release. The vulnerability is classified under CWE-624, indicating an executable regular expression error. The CVSS 4.0 base score is 9.2 (critical), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), but requires partial attack complexity (AC:L) and partial attack vector (AT:P). The vulnerability impacts confidentiality, integrity, and availability at a high level (VC:H, VI:H, VA:H). Exploitation does not require authentication, making it highly dangerous. Although no known exploits are reported in the wild yet, the nature of the flaw—remote code execution via email processing—makes it a prime target for attackers. The vulnerability could allow attackers to execute arbitrary PHP code remotely, potentially leading to full system compromise, data theft, or service disruption. The issue is particularly critical in environments where pearweb is used to process external inputs such as bug reports or emails, common in software development and hosting infrastructures.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially those relying on pearweb in their PHP-based infrastructure for bug tracking, email processing, or component distribution. Successful exploitation could lead to remote code execution, enabling attackers to take full control of affected systems, steal sensitive data, disrupt services, or use compromised servers as pivot points for further attacks. This is particularly concerning for sectors such as government, finance, telecommunications, and software development firms that often use PEAR components. The lack of required authentication and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation. Additionally, compromised systems could be used to launch attacks on other internal or external targets, amplifying the impact. The vulnerability could also damage organizational reputation and lead to regulatory penalties under GDPR if personal data is exposed or systems are disrupted.
Mitigation Recommendations
1. Immediate upgrade of pearweb to version 1.33.0 or later, where the vulnerability is patched. 2. Audit all PHP code handling email inputs or using preg_replace() with the /e modifier to identify and refactor unsafe code patterns. 3. Implement strict input validation and sanitization on all external inputs, especially those processed in email handling workflows. 4. Employ web application firewalls (WAFs) with rules to detect and block suspicious payloads targeting PHP code execution vulnerabilities. 5. Monitor logs for unusual activity related to email processing or PHP execution errors. 6. Restrict network access to systems running pearweb to trusted sources where possible. 7. Conduct regular security assessments and code reviews focusing on legacy PHP functions known to be risky. 8. Educate development teams about the risks of deprecated PHP features like the /e modifier and promote secure coding practices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2026-25237: CWE-624: Executable Regular Expression Error in pear pearweb
Description
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, use of preg_replace() with the /e modifier in bug update email handling can enable PHP code execution if attacker-controlled content reaches the evaluated replacement. This issue has been patched in version 1.33.0.
AI-Powered Analysis
Technical Analysis
CVE-2026-25237 is a critical vulnerability identified in pearweb, a component of the PEAR PHP framework used for reusable PHP components. The vulnerability stems from the use of the preg_replace() function with the deprecated /e modifier in the handling of bug update emails. The /e modifier causes the replacement string to be evaluated as PHP code, which, if attacker-controlled input reaches this evaluated replacement, allows for arbitrary PHP code execution on the server. This flaw exists in pearweb versions prior to 1.33.0 and has been patched in that release. The vulnerability is classified under CWE-624, indicating an executable regular expression error. The CVSS 4.0 base score is 9.2 (critical), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), but requires partial attack complexity (AC:L) and partial attack vector (AT:P). The vulnerability impacts confidentiality, integrity, and availability at a high level (VC:H, VI:H, VA:H). Exploitation does not require authentication, making it highly dangerous. Although no known exploits are reported in the wild yet, the nature of the flaw—remote code execution via email processing—makes it a prime target for attackers. The vulnerability could allow attackers to execute arbitrary PHP code remotely, potentially leading to full system compromise, data theft, or service disruption. The issue is particularly critical in environments where pearweb is used to process external inputs such as bug reports or emails, common in software development and hosting infrastructures.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially those relying on pearweb in their PHP-based infrastructure for bug tracking, email processing, or component distribution. Successful exploitation could lead to remote code execution, enabling attackers to take full control of affected systems, steal sensitive data, disrupt services, or use compromised servers as pivot points for further attacks. This is particularly concerning for sectors such as government, finance, telecommunications, and software development firms that often use PEAR components. The lack of required authentication and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation. Additionally, compromised systems could be used to launch attacks on other internal or external targets, amplifying the impact. The vulnerability could also damage organizational reputation and lead to regulatory penalties under GDPR if personal data is exposed or systems are disrupted.
Mitigation Recommendations
1. Immediate upgrade of pearweb to version 1.33.0 or later, where the vulnerability is patched. 2. Audit all PHP code handling email inputs or using preg_replace() with the /e modifier to identify and refactor unsafe code patterns. 3. Implement strict input validation and sanitization on all external inputs, especially those processed in email handling workflows. 4. Employ web application firewalls (WAFs) with rules to detect and block suspicious payloads targeting PHP code execution vulnerabilities. 5. Monitor logs for unusual activity related to email processing or PHP execution errors. 6. Restrict network access to systems running pearweb to trusted sources where possible. 7. Conduct regular security assessments and code reviews focusing on legacy PHP functions known to be risky. 8. Educate development teams about the risks of deprecated PHP features like the /e modifier and promote secure coding practices.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-30T14:44:47.329Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698245baf9fa50a62fda11e7
Added to database: 2/3/2026, 7:00:10 PM
Last enriched: 2/3/2026, 7:15:46 PM
Last updated: 2/7/2026, 7:47:58 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2109: Improper Authorization in jsbroks COCO Annotator
MediumCVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumCVE-2026-2107: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2105: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.