PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, use of preg_replace() with the /e modifier in bug update email handling can enable PHP code execution if attacker-controlled content reaches the evaluated replacement. This issue has been patched in version 1.33.0.
Metrics
Affected Vendors & Products
References
History
Tue, 03 Feb 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, use of preg_replace() with the /e modifier in bug update email handling can enable PHP code execution if attacker-controlled content reaches the evaluated replacement. This issue has been patched in version 1.33.0. | |
| Title | PEAR is Vulnerable to PHP Code Execution via preg_replace /e in Bug Update Emails | |
| Weaknesses | CWE-624 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-03T18:29:54.001Z
Reserved: 2026-01-30T14:44:47.329Z
Link: CVE-2026-25237
No data.
Status : Received
Published: 2026-02-03T19:16:24.867
Modified: 2026-02-03T19:16:24.867
Link: CVE-2026-25237
No data.
OpenCVE Enrichment
No data.