Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25238: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in pear pearweb

0
Critical
VulnerabilityCVE-2026-25238cvecve-2026-25238cwe-89
Published: Tue Feb 03 2026 (02/03/2026, 18:30:14 UTC)
Source: CVE Database V5
Vendor/Project: pear
Product: pearweb

Description

PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, a SQL injection vulnerability in bug subscription deletion may allow attackers to inject SQL via a crafted email value. This issue has been patched in version 1.33.0.

AI-Powered Analysis

AILast updated: 02/03/2026, 19:15:27 UTC

Technical Analysis

CVE-2026-25238 is a critical SQL injection vulnerability identified in the PEAR pearweb framework, a widely used PHP component distribution system. The flaw exists in versions prior to 1.33.0 within the bug subscription deletion functionality, where the application fails to properly sanitize or neutralize special characters in the email parameter before incorporating it into SQL commands. This improper neutralization (CWE-89) allows an unauthenticated attacker to craft a malicious email input that can alter the intended SQL query logic. Exploiting this vulnerability can lead to unauthorized data access, modification, or deletion within the backend database, potentially compromising sensitive information or disrupting service availability. The vulnerability has a CVSS 4.0 base score of 9.2, reflecting its critical nature due to network attack vector, low attack complexity, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no active exploits have been reported, the vulnerability's presence in a common PHP framework component poses a significant risk to any application relying on affected versions of pearweb. The issue was publicly disclosed and patched in version 1.33.0, emphasizing the importance of timely updates.

Potential Impact

For European organizations, the impact of CVE-2026-25238 can be substantial. Many enterprises and public sector entities in Europe utilize PHP-based web applications and frameworks, including PEAR components, for internal and customer-facing services. Exploitation could lead to unauthorized access to sensitive personal data protected under GDPR, resulting in regulatory penalties and reputational damage. The ability to manipulate database queries could also allow attackers to disrupt critical business processes, delete or alter data, or escalate attacks within the network. Given the critical severity and ease of exploitation, organizations that have not updated pearweb risk data breaches and service outages. The impact extends to sectors with high reliance on PHP applications such as finance, healthcare, government, and e-commerce across Europe.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately upgrade all instances of pearweb to version 1.33.0 or later where the issue is patched. In addition, developers should review and refactor any custom code interacting with pearweb components to ensure proper input validation and use of parameterized queries or prepared statements to prevent SQL injection. Organizations should conduct thorough code audits and penetration testing focusing on SQL injection vectors. Implementing Web Application Firewalls (WAFs) with rules targeting SQL injection patterns can provide an additional layer of defense. Monitoring database logs for unusual queries or access patterns can help detect exploitation attempts early. Finally, organizations should maintain an up-to-date asset inventory to identify all systems using pearweb and ensure timely patch management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-30T14:44:47.329Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698245baf9fa50a62fda11ea

Added to database: 2/3/2026, 7:00:10 PM

Last enriched: 2/3/2026, 7:15:27 PM

Last updated: 2/7/2026, 12:08:30 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats