PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, use of preg_replace() with the /e modifier in bug update email handling can enable PHP code execution if attacker-controlled content reaches the evaluated replacement. This issue has been patched in version 1.33.0.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 03 Feb 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, use of preg_replace() with the /e modifier in bug update email handling can enable PHP code execution if attacker-controlled content reaches the evaluated replacement. This issue has been patched in version 1.33.0. | |
| Title | PEAR is Vulnerable to PHP Code Execution via preg_replace /e in Bug Update Emails | |
| Weaknesses | CWE-624 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-03T18:29:54.001Z
Reserved: 2026-01-30T14:44:47.329Z
Link: CVE-2026-25237
No data.
Status : Received
Published: 2026-02-03T19:16:24.867
Modified: 2026-02-03T19:16:24.867
Link: CVE-2026-25237
No data.
OpenCVE Enrichment
No data.
Weaknesses