Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25239: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in pear pearweb

0
High
VulnerabilityCVE-2026-25239cvecve-2026-25239cwe-89
Published: Tue Feb 03 2026 (02/03/2026, 18:30:53 UTC)
Source: CVE Database V5
Vendor/Project: pear
Product: pearweb

Description

CVE-2026-25239 is a high-severity SQL injection vulnerability in the PEAR pearweb component prior to version 1. 33. 0. It arises from improper neutralization of special elements in SQL commands during the insertion of filenames into an API documentation queue. An unauthenticated attacker can manipulate the filename parameter to execute arbitrary SQL queries, potentially compromising data integrity and confidentiality. The vulnerability has been patched in version 1. 33. 0. No known exploits are currently reported in the wild. European organizations using pearweb versions before 1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:41:26 UTC

Technical Analysis

CVE-2026-25239 is a SQL injection vulnerability classified under CWE-89 affecting the pearweb product of the PEAR PHP framework and distribution system. The vulnerability exists in the apidoc queue insertion functionality, where the filename value inserted into the database is not properly sanitized or neutralized. This allows an attacker who can influence the filename parameter to inject malicious SQL commands, leading to unauthorized query manipulation. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network with low attack complexity. The impact primarily affects data integrity and confidentiality, as attackers could alter or exfiltrate sensitive data stored in the backend database. The vulnerability was patched in pearweb version 1.33.0, and users running earlier versions should upgrade immediately. Although no known exploits are reported in the wild, the high CVSS score of 8.2 reflects the critical nature of the flaw and the potential for severe damage if exploited. The vulnerability is particularly relevant for organizations that use PEAR components in their PHP environments, especially those that rely on pearweb for managing reusable PHP components and API documentation.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized access to sensitive data, data corruption, or complete compromise of the backend database used by pearweb. This could affect internal development environments, software distribution systems, or any web applications relying on PEAR components. The breach of confidentiality and integrity could result in intellectual property theft, disruption of software supply chains, and damage to organizational reputation. Given the widespread use of PHP and PEAR in European web development, especially in sectors like finance, government, and technology, the impact could be significant. Furthermore, the vulnerability's ease of exploitation without authentication increases the risk of automated attacks targeting vulnerable systems. Organizations that have not patched pearweb may face compliance issues under GDPR if personal data is exposed or manipulated.

Mitigation Recommendations

The primary mitigation is to upgrade pearweb to version 1.33.0 or later, where the vulnerability is patched. Organizations should audit their PHP environments to identify any instances of pearweb and verify the version in use. Additionally, review and sanitize all inputs related to API documentation queues or filename parameters to ensure no unsanitized data reaches SQL queries. Implementing Web Application Firewalls (WAFs) with rules to detect and block SQL injection attempts targeting pearweb endpoints can provide temporary protection. Conduct code reviews and penetration testing focused on SQL injection vectors within PEAR components. Monitor logs for suspicious database query patterns or unexpected errors related to apidoc queue operations. Finally, establish a rapid patch management process to address future vulnerabilities in third-party PHP components promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-30T14:44:47.329Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698245bcf9fa50a62fda122b

Added to database: 2/3/2026, 7:00:12 PM

Last enriched: 2/11/2026, 11:41:26 AM

Last updated: 3/20/2026, 11:35:28 PM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses