Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25239: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in pear pearweb

0
High
VulnerabilityCVE-2026-25239cvecve-2026-25239cwe-89
Published: Tue Feb 03 2026 (02/03/2026, 18:30:53 UTC)
Source: CVE Database V5
Vendor/Project: pear
Product: pearweb

Description

CVE-2026-25239 is a high-severity SQL injection vulnerability affecting pearweb versions prior to 1. 33. 0. The flaw arises from improper neutralization of special elements in SQL commands during apidoc queue insertion, specifically when an attacker can influence the filename value inserted into the database. Exploitation does not require authentication or user interaction and can lead to high-impact integrity violations by manipulating database queries. Although no known exploits are currently reported in the wild, the vulnerability has been patched in version 1. 33. 0. European organizations using pearweb in their PHP environments should prioritize updating to the fixed version to prevent potential data manipulation or compromise. Countries with significant PHP development communities and industries relying on open-source PHP components are most at risk.

AI-Powered Analysis

AILast updated: 02/03/2026, 19:15:11 UTC

Technical Analysis

CVE-2026-25239 identifies a SQL injection vulnerability in the pearweb component of the PEAR PHP framework, specifically affecting versions before 1.33.0. The vulnerability is classified under CWE-89, indicating improper neutralization of special elements used in SQL commands. The flaw exists in the apidoc queue insertion functionality, where the filename parameter is not properly sanitized before being incorporated into SQL queries. An attacker capable of influencing this filename value can manipulate the underlying SQL query, potentially altering database contents or extracting sensitive information. The vulnerability has a CVSS 4.0 base score of 8.2, reflecting high severity due to its network attack vector, low attack complexity, no privileges required, no user interaction, and a high impact on data integrity. The vulnerability does not affect confidentiality or availability directly but can severely compromise the integrity of the database. No known exploits have been reported in the wild as of the publication date, but the issue has been addressed in pearweb version 1.33.0. This vulnerability is critical for environments that rely on pearweb for PHP component management or documentation generation, as it could allow remote attackers to execute arbitrary SQL commands, leading to data corruption or unauthorized data manipulation.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on pearweb within their PHP development or deployment environments. Successful exploitation could allow attackers to manipulate database records, potentially leading to corrupted data, unauthorized changes to application behavior, or indirect exposure of sensitive information through manipulated queries. This could affect web applications, internal tools, or documentation systems that use pearweb, undermining data integrity and trustworthiness. Industries such as finance, healthcare, and government, which often rely on PHP-based systems and require stringent data integrity, could face compliance and operational risks. Additionally, the vulnerability could be leveraged as a foothold for further attacks within a network if combined with other vulnerabilities or misconfigurations. The lack of required authentication and user interaction increases the risk of automated exploitation attempts, making timely patching critical.

Mitigation Recommendations

To mitigate CVE-2026-25239, European organizations should immediately upgrade pearweb to version 1.33.0 or later, where the vulnerability has been patched. In addition to patching, organizations should implement strict input validation and sanitization for any user-controllable inputs, especially those that interact with SQL queries. Employing parameterized queries or prepared statements in custom code interfacing with pearweb components can reduce the risk of SQL injection. Monitoring database logs for unusual query patterns or unexpected data modifications can help detect exploitation attempts early. Network-level protections such as web application firewalls (WAFs) configured to detect and block SQL injection payloads can provide an additional layer of defense. Organizations should also review their development and deployment processes to ensure third-party components like pearweb are regularly updated and security patches are applied promptly. Finally, conducting security audits and penetration testing focused on injection vulnerabilities can help identify residual risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-30T14:44:47.329Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698245bcf9fa50a62fda122b

Added to database: 2/3/2026, 7:00:12 PM

Last enriched: 2/3/2026, 7:15:11 PM

Last updated: 2/3/2026, 8:20:13 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats