CVE-2026-25238: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in pear pearweb
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, a SQL injection vulnerability in bug subscription deletion may allow attackers to inject SQL via a crafted email value. This issue has been patched in version 1.33.0.
AI Analysis
Technical Summary
CVE-2026-25238 is a critical SQL injection vulnerability identified in the PEAR pearweb framework, a widely used PHP component distribution system. The flaw exists in versions prior to 1.33.0 within the bug subscription deletion functionality, where the application fails to properly sanitize or neutralize special characters in the email parameter before incorporating it into SQL commands. This improper neutralization (CWE-89) allows an unauthenticated attacker to craft a malicious email input that can alter the intended SQL query logic. Exploiting this vulnerability can lead to unauthorized data access, modification, or deletion within the backend database, potentially compromising sensitive information or disrupting service availability. The vulnerability has a CVSS 4.0 base score of 9.2, reflecting its critical nature due to network attack vector, low attack complexity, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no active exploits have been reported, the vulnerability's presence in a common PHP framework component poses a significant risk to any application relying on affected versions of pearweb. The issue was publicly disclosed and patched in version 1.33.0, emphasizing the importance of timely updates.
Potential Impact
For European organizations, the impact of CVE-2026-25238 can be substantial. Many enterprises and public sector entities in Europe utilize PHP-based web applications and frameworks, including PEAR components, for internal and customer-facing services. Exploitation could lead to unauthorized access to sensitive personal data protected under GDPR, resulting in regulatory penalties and reputational damage. The ability to manipulate database queries could also allow attackers to disrupt critical business processes, delete or alter data, or escalate attacks within the network. Given the critical severity and ease of exploitation, organizations that have not updated pearweb risk data breaches and service outages. The impact extends to sectors with high reliance on PHP applications such as finance, healthcare, government, and e-commerce across Europe.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately upgrade all instances of pearweb to version 1.33.0 or later where the issue is patched. In addition, developers should review and refactor any custom code interacting with pearweb components to ensure proper input validation and use of parameterized queries or prepared statements to prevent SQL injection. Organizations should conduct thorough code audits and penetration testing focusing on SQL injection vectors. Implementing Web Application Firewalls (WAFs) with rules targeting SQL injection patterns can provide an additional layer of defense. Monitoring database logs for unusual queries or access patterns can help detect exploitation attempts early. Finally, organizations should maintain an up-to-date asset inventory to identify all systems using pearweb and ensure timely patch management.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2026-25238: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in pear pearweb
Description
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, a SQL injection vulnerability in bug subscription deletion may allow attackers to inject SQL via a crafted email value. This issue has been patched in version 1.33.0.
AI-Powered Analysis
Technical Analysis
CVE-2026-25238 is a critical SQL injection vulnerability identified in the PEAR pearweb framework, a widely used PHP component distribution system. The flaw exists in versions prior to 1.33.0 within the bug subscription deletion functionality, where the application fails to properly sanitize or neutralize special characters in the email parameter before incorporating it into SQL commands. This improper neutralization (CWE-89) allows an unauthenticated attacker to craft a malicious email input that can alter the intended SQL query logic. Exploiting this vulnerability can lead to unauthorized data access, modification, or deletion within the backend database, potentially compromising sensitive information or disrupting service availability. The vulnerability has a CVSS 4.0 base score of 9.2, reflecting its critical nature due to network attack vector, low attack complexity, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no active exploits have been reported, the vulnerability's presence in a common PHP framework component poses a significant risk to any application relying on affected versions of pearweb. The issue was publicly disclosed and patched in version 1.33.0, emphasizing the importance of timely updates.
Potential Impact
For European organizations, the impact of CVE-2026-25238 can be substantial. Many enterprises and public sector entities in Europe utilize PHP-based web applications and frameworks, including PEAR components, for internal and customer-facing services. Exploitation could lead to unauthorized access to sensitive personal data protected under GDPR, resulting in regulatory penalties and reputational damage. The ability to manipulate database queries could also allow attackers to disrupt critical business processes, delete or alter data, or escalate attacks within the network. Given the critical severity and ease of exploitation, organizations that have not updated pearweb risk data breaches and service outages. The impact extends to sectors with high reliance on PHP applications such as finance, healthcare, government, and e-commerce across Europe.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately upgrade all instances of pearweb to version 1.33.0 or later where the issue is patched. In addition, developers should review and refactor any custom code interacting with pearweb components to ensure proper input validation and use of parameterized queries or prepared statements to prevent SQL injection. Organizations should conduct thorough code audits and penetration testing focusing on SQL injection vectors. Implementing Web Application Firewalls (WAFs) with rules targeting SQL injection patterns can provide an additional layer of defense. Monitoring database logs for unusual queries or access patterns can help detect exploitation attempts early. Finally, organizations should maintain an up-to-date asset inventory to identify all systems using pearweb and ensure timely patch management.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-30T14:44:47.329Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698245baf9fa50a62fda11ea
Added to database: 2/3/2026, 7:00:10 PM
Last enriched: 2/3/2026, 7:15:27 PM
Last updated: 2/7/2026, 12:08:30 PM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.