CVE-2026-25237: CWE-624: Executable Regular Expression Error in pear pearweb
CVE-2026-25237 is a critical vulnerability in pearweb, a component of the PEAR PHP framework, affecting versions prior to 1. 33. 0. It arises from the use of preg_replace() with the deprecated /e modifier, which allows attacker-controlled input to be evaluated as PHP code during bug update email handling. This leads to remote code execution without requiring authentication or user interaction. The vulnerability has a CVSS 4. 0 score of 9. 2, indicating high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and severity make it a significant threat. European organizations using pearweb in their PHP environments are at risk, especially those in sectors relying on legacy PHP components.
AI Analysis
Technical Summary
CVE-2026-25237 is a critical remote code execution vulnerability in pearweb, a part of the PEAR framework used for reusable PHP components. The flaw stems from the use of the preg_replace() function with the /e modifier, which evaluates the replacement string as PHP code. In pearweb versions prior to 1.33.0, this occurs during the processing of bug update emails, where attacker-controlled input can be injected into the evaluated replacement parameter. This allows an unauthenticated attacker to execute arbitrary PHP code on the server, potentially leading to full system compromise. The vulnerability is classified under CWE-624 (Executable Regular Expression Error), reflecting the misuse of regular expression evaluation leading to code execution. The CVSS 4.0 score of 9.2 reflects the vulnerability's network attack vector, low complexity, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits have been observed yet, the vulnerability is straightforward to exploit due to the direct evaluation of attacker input. The issue was patched in pearweb version 1.33.0 by removing the unsafe use of preg_replace() with the /e modifier. Organizations running pearweb versions below 1.33.0 should prioritize upgrading and review any custom PHP code that might use similar patterns. Given PEAR's usage in PHP development, this vulnerability poses a significant risk to web applications relying on pearweb components.
Potential Impact
The impact of CVE-2026-25237 on European organizations can be severe. Successful exploitation allows remote attackers to execute arbitrary PHP code without authentication or user interaction, potentially leading to full server compromise. This can result in data breaches, unauthorized access to sensitive information, disruption of services, and deployment of further malware or ransomware. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on PHP-based web applications using pearweb are particularly vulnerable. The vulnerability undermines confidentiality, integrity, and availability of affected systems. Given the high CVSS score and ease of exploitation, attackers could leverage this flaw to pivot within networks or exfiltrate data. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the threat landscape could rapidly evolve. European entities with legacy PHP environments or delayed patching practices face increased risk of targeted attacks exploiting this vulnerability.
Mitigation Recommendations
1. Immediately upgrade pearweb to version 1.33.0 or later, where the vulnerability is patched. 2. Audit all PHP codebases for usage of preg_replace() with the /e modifier or similar constructs that evaluate user input, and refactor to use safer alternatives such as preg_replace_callback(). 3. Implement strict input validation and sanitization for any data processed by regular expressions or evaluated code paths. 4. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting this vulnerability. 5. Monitor logs for unusual activity related to bug update email handling or unexpected PHP code execution. 6. Conduct penetration testing focusing on injection vectors in PHP applications using pearweb components. 7. Educate development teams on secure PHP coding practices to avoid deprecated and unsafe functions. 8. Maintain an up-to-date inventory of PHP components and dependencies to ensure timely patching. 9. Restrict permissions of PHP processes to minimize impact if exploitation occurs. 10. Consider network segmentation to isolate critical systems running vulnerable PHP applications.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2026-25237: CWE-624: Executable Regular Expression Error in pear pearweb
Description
CVE-2026-25237 is a critical vulnerability in pearweb, a component of the PEAR PHP framework, affecting versions prior to 1. 33. 0. It arises from the use of preg_replace() with the deprecated /e modifier, which allows attacker-controlled input to be evaluated as PHP code during bug update email handling. This leads to remote code execution without requiring authentication or user interaction. The vulnerability has a CVSS 4. 0 score of 9. 2, indicating high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and severity make it a significant threat. European organizations using pearweb in their PHP environments are at risk, especially those in sectors relying on legacy PHP components.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-25237 is a critical remote code execution vulnerability in pearweb, a part of the PEAR framework used for reusable PHP components. The flaw stems from the use of the preg_replace() function with the /e modifier, which evaluates the replacement string as PHP code. In pearweb versions prior to 1.33.0, this occurs during the processing of bug update emails, where attacker-controlled input can be injected into the evaluated replacement parameter. This allows an unauthenticated attacker to execute arbitrary PHP code on the server, potentially leading to full system compromise. The vulnerability is classified under CWE-624 (Executable Regular Expression Error), reflecting the misuse of regular expression evaluation leading to code execution. The CVSS 4.0 score of 9.2 reflects the vulnerability's network attack vector, low complexity, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits have been observed yet, the vulnerability is straightforward to exploit due to the direct evaluation of attacker input. The issue was patched in pearweb version 1.33.0 by removing the unsafe use of preg_replace() with the /e modifier. Organizations running pearweb versions below 1.33.0 should prioritize upgrading and review any custom PHP code that might use similar patterns. Given PEAR's usage in PHP development, this vulnerability poses a significant risk to web applications relying on pearweb components.
Potential Impact
The impact of CVE-2026-25237 on European organizations can be severe. Successful exploitation allows remote attackers to execute arbitrary PHP code without authentication or user interaction, potentially leading to full server compromise. This can result in data breaches, unauthorized access to sensitive information, disruption of services, and deployment of further malware or ransomware. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on PHP-based web applications using pearweb are particularly vulnerable. The vulnerability undermines confidentiality, integrity, and availability of affected systems. Given the high CVSS score and ease of exploitation, attackers could leverage this flaw to pivot within networks or exfiltrate data. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the threat landscape could rapidly evolve. European entities with legacy PHP environments or delayed patching practices face increased risk of targeted attacks exploiting this vulnerability.
Mitigation Recommendations
1. Immediately upgrade pearweb to version 1.33.0 or later, where the vulnerability is patched. 2. Audit all PHP codebases for usage of preg_replace() with the /e modifier or similar constructs that evaluate user input, and refactor to use safer alternatives such as preg_replace_callback(). 3. Implement strict input validation and sanitization for any data processed by regular expressions or evaluated code paths. 4. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting this vulnerability. 5. Monitor logs for unusual activity related to bug update email handling or unexpected PHP code execution. 6. Conduct penetration testing focusing on injection vectors in PHP applications using pearweb components. 7. Educate development teams on secure PHP coding practices to avoid deprecated and unsafe functions. 8. Maintain an up-to-date inventory of PHP components and dependencies to ensure timely patching. 9. Restrict permissions of PHP processes to minimize impact if exploitation occurs. 10. Consider network segmentation to isolate critical systems running vulnerable PHP applications.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-30T14:44:47.329Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698245baf9fa50a62fda11e7
Added to database: 2/3/2026, 7:00:10 PM
Last enriched: 2/11/2026, 11:45:44 AM
Last updated: 3/24/2026, 11:33:27 AM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.