Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25241: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in pear pearweb

0
Critical
VulnerabilityCVE-2026-25241cvecve-2026-25241cwe-89
Published: Tue Feb 03 2026 (02/03/2026, 18:31:17 UTC)
Source: CVE Database V5
Vendor/Project: pear
Product: pearweb

Description

CVE-2026-25241 is a critical SQL injection vulnerability in the PEAR pearweb framework prior to version 1. 33. 0. It allows unauthenticated remote attackers to execute arbitrary SQL commands via a crafted package version parameter in the /get/<package>/<version> endpoint. The vulnerability requires no authentication or user interaction and affects the confidentiality, integrity, and availability of affected systems. Although no known exploits are currently in the wild, the high CVSS score of 9. 3 reflects the ease of exploitation and severe impact. European organizations using pearweb versions below 1. 33. 0 are at risk, especially those relying on PHP-based package management or development infrastructure.

AI-Powered Analysis

AILast updated: 02/03/2026, 19:14:58 UTC

Technical Analysis

CVE-2026-25241 is a critical SQL injection vulnerability identified in the PEAR pearweb framework, a PHP-based system used for distributing reusable components. The flaw exists in the /get/<package>/<version> endpoint, where the 'version' parameter is improperly sanitized, allowing an attacker to inject malicious SQL commands. Because the vulnerability is unauthenticated and requires no user interaction, remote attackers can exploit it to execute arbitrary SQL queries against the backend database. This can lead to unauthorized data disclosure, data manipulation, or even complete system compromise depending on the database privileges. The vulnerability affects all pearweb versions prior to 1.33.0, with the vendor having released a patch in version 1.33.0 to address the issue. The CVSS 4.0 base score of 9.3 reflects the vulnerability's critical nature, highlighting its network attack vector, low complexity, no privileges required, and no user interaction needed. Although no public exploits have been reported yet, the vulnerability's characteristics make it a prime target for attackers seeking to compromise PHP-based infrastructure. The vulnerability falls under CWE-89, which covers improper neutralization of special elements in SQL commands, a common and dangerous web application security flaw. Organizations using pearweb for package management or development should prioritize patching and monitoring for suspicious activity related to this endpoint.

Potential Impact

For European organizations, this vulnerability presents a significant risk to the confidentiality, integrity, and availability of their systems. Exploitation could lead to unauthorized access to sensitive data stored in databases, including intellectual property, user credentials, or internal configuration data. Attackers could manipulate or delete data, disrupt services, or leverage the compromised system as a foothold for further network intrusion. Given the unauthenticated nature of the exploit, attackers can target exposed pearweb instances directly over the internet, increasing the attack surface. Organizations involved in software development, package distribution, or those relying on PHP-based infrastructure are particularly vulnerable. The impact extends to regulatory compliance risks under GDPR if personal data is exposed or altered. Additionally, disruption of development workflows or package management services could have operational consequences. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the critical severity demands immediate attention to prevent potential future attacks.

Mitigation Recommendations

1. Immediately upgrade all pearweb instances to version 1.33.0 or later, where the vulnerability is patched. 2. Implement strict input validation and sanitization on all user-supplied parameters, especially those used in SQL queries. 3. Deploy Web Application Firewalls (WAFs) with rules specifically designed to detect and block SQL injection payloads targeting the /get/<package>/<version> endpoint. 4. Conduct thorough code reviews and security testing on custom PHP components interacting with pearweb to identify any similar injection flaws. 5. Restrict network exposure of pearweb services to trusted internal networks or VPNs where possible to reduce external attack vectors. 6. Monitor logs and network traffic for unusual or suspicious requests targeting the vulnerable endpoint. 7. Educate development and operations teams about the risks of SQL injection and secure coding practices. 8. Regularly audit and update all third-party components and dependencies to ensure timely application of security patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-30T14:44:47.329Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698245bcf9fa50a62fda1231

Added to database: 2/3/2026, 7:00:12 PM

Last enriched: 2/3/2026, 7:14:58 PM

Last updated: 2/3/2026, 8:13:39 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats