Vulnerability Description
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, use of preg_replace() with the /e modifier in bug update email handling can enable PHP code execution if attacker-controlled content reaches the evaluated replacement. This issue has been patched in version 1.33.0.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pear | Pearweb | < 1.33.0 |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2026-25237?
CVE-2026-25237 is a vulnerability with a CVSS score of 9.8 (CRITICAL). PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, use of preg_replace() with the /e modifier in bug update email handling can enable PHP code execution ...
How severe is CVE-2026-25237?
CVE-2026-25237 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-25237?
Check the references section above for vendor advisories and patch information. Affected products include: Pear Pearweb.