CVE-2026-25237
EUVD-2026-519803.02.2026, 19:16
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, use of preg_replace() with the /e modifier in bug update email handling can enable PHP code execution if attacker-controlled content reaches the evaluated replacement. This issue has been patched in version 1.33.0.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| pear | pearweb | 𝑥 < 1.33.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration