Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25237: CWE-624: Executable Regular Expression Error in pear pearweb

0
Critical
VulnerabilityCVE-2026-25237cvecve-2026-25237cwe-624
Published: Tue Feb 03 2026 (02/03/2026, 18:29:54 UTC)
Source: CVE Database V5
Vendor/Project: pear
Product: pearweb

Description

CVE-2026-25237 is a critical vulnerability in pearweb, a component of the PEAR PHP framework, affecting versions prior to 1. 33. 0. It arises from the use of preg_replace() with the deprecated /e modifier, which allows attacker-controlled input to be evaluated as PHP code during bug update email handling. This leads to remote code execution without requiring authentication or user interaction. The vulnerability has a CVSS 4. 0 score of 9. 2, indicating high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and severity make it a significant threat. European organizations using pearweb in their PHP environments are at risk, especially those in sectors relying on legacy PHP components.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:45:44 UTC

Technical Analysis

CVE-2026-25237 is a critical remote code execution vulnerability in pearweb, a part of the PEAR framework used for reusable PHP components. The flaw stems from the use of the preg_replace() function with the /e modifier, which evaluates the replacement string as PHP code. In pearweb versions prior to 1.33.0, this occurs during the processing of bug update emails, where attacker-controlled input can be injected into the evaluated replacement parameter. This allows an unauthenticated attacker to execute arbitrary PHP code on the server, potentially leading to full system compromise. The vulnerability is classified under CWE-624 (Executable Regular Expression Error), reflecting the misuse of regular expression evaluation leading to code execution. The CVSS 4.0 score of 9.2 reflects the vulnerability's network attack vector, low complexity, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits have been observed yet, the vulnerability is straightforward to exploit due to the direct evaluation of attacker input. The issue was patched in pearweb version 1.33.0 by removing the unsafe use of preg_replace() with the /e modifier. Organizations running pearweb versions below 1.33.0 should prioritize upgrading and review any custom PHP code that might use similar patterns. Given PEAR's usage in PHP development, this vulnerability poses a significant risk to web applications relying on pearweb components.

Potential Impact

The impact of CVE-2026-25237 on European organizations can be severe. Successful exploitation allows remote attackers to execute arbitrary PHP code without authentication or user interaction, potentially leading to full server compromise. This can result in data breaches, unauthorized access to sensitive information, disruption of services, and deployment of further malware or ransomware. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on PHP-based web applications using pearweb are particularly vulnerable. The vulnerability undermines confidentiality, integrity, and availability of affected systems. Given the high CVSS score and ease of exploitation, attackers could leverage this flaw to pivot within networks or exfiltrate data. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the threat landscape could rapidly evolve. European entities with legacy PHP environments or delayed patching practices face increased risk of targeted attacks exploiting this vulnerability.

Mitigation Recommendations

1. Immediately upgrade pearweb to version 1.33.0 or later, where the vulnerability is patched. 2. Audit all PHP codebases for usage of preg_replace() with the /e modifier or similar constructs that evaluate user input, and refactor to use safer alternatives such as preg_replace_callback(). 3. Implement strict input validation and sanitization for any data processed by regular expressions or evaluated code paths. 4. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting this vulnerability. 5. Monitor logs for unusual activity related to bug update email handling or unexpected PHP code execution. 6. Conduct penetration testing focusing on injection vectors in PHP applications using pearweb components. 7. Educate development teams on secure PHP coding practices to avoid deprecated and unsafe functions. 8. Maintain an up-to-date inventory of PHP components and dependencies to ensure timely patching. 9. Restrict permissions of PHP processes to minimize impact if exploitation occurs. 10. Consider network segmentation to isolate critical systems running vulnerable PHP applications.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-30T14:44:47.329Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698245baf9fa50a62fda11e7

Added to database: 2/3/2026, 7:00:10 PM

Last enriched: 2/11/2026, 11:45:44 AM

Last updated: 3/24/2026, 11:33:27 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses