Description
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, a SQL injection vulnerability in bug subscription deletion may allow attackers to inject SQL via a crafted email value. This issue has been patched in version 1.33.0.
Published: 2026-02-03
Score: 9.2 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection via Bug Subscription Deletion
Action: Immediate Patch
AI Analysis

Impact

A flaw in the Pear framework allows attackers to craft an email address containing malicious SQL code when deleting a bug subscription. The deletion routine does not properly sanitize the email input, creating an injection point that can be used to read, modify, or delete database records. This weakness is classified as CWE‑89 and can lead to full compromise of the underlying database. The impact is significant, granting an attacker unauthorized access to data and potentially allowing further pivoting within the affected system.

Affected Systems

The vulnerability exists in all releases of the Pearweb distribution system prior to version 1.33.0. Any installation of Pear that includes the undeleted bug subscription component and is running a version older than 1.33.0 is susceptible.

Risk and Exploitability

The CVSS score of 9.2 indicates critical severity. Although the EPSS score is less than 1%, suggesting a low probability of widespread exploitation at present, the availability of a critical patch and public disclosures mean that attackers may still target these systems. The likely attack vector is via the bug subscription deletion endpoint; an attacker who can submit a crafted email address—potentially requiring authenticated access to that functionality—may inject arbitrary SQL. The lack of input validation combined with ultimate database access makes this a high‑risk vulnerability that requires prompt remediation.

Generated by OpenCVE AI on April 18, 2026 at 00:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to pearweb version 1.33.0 or newer to remove the injection vector.
  • If upgrading is temporarily infeasible, disable or secure the bug subscription deletion functionality to prevent unauthenticated or unauthorized use.
  • Implement strict server‑side validation of email inputs on the deletion endpoint, ensuring that only syntactically valid addresses are processed, and employ parameterized queries for any database interaction.

Generated by OpenCVE AI on April 18, 2026 at 00:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 05 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:pear:pearweb:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 04 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Pear
Pear pearweb
Vendors & Products Pear
Pear pearweb

Tue, 03 Feb 2026 19:00:00 +0000

Type Values Removed Values Added
Description PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, a SQL injection vulnerability in bug subscription deletion may allow attackers to inject SQL via a crafted email value. This issue has been patched in version 1.33.0.
Title PEAR is Vulnerable to SQL Injection in Bug Subscription Deletion via Weak Email Validation
Weaknesses CWE-89
References
Metrics cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-04T21:16:19.309Z

Reserved: 2026-01-30T14:44:47.329Z

Link: CVE-2026-25238

cve-icon Vulnrichment

Updated: 2026-02-04T21:16:16.793Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-03T19:16:25.010

Modified: 2026-02-05T18:01:30.977

Link: CVE-2026-25238

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T00:15:31Z

Weaknesses