Unrated severityOSV Advisory· Published Feb 3, 2026· Updated Feb 4, 2026
PEAR is Vulnerable to PHP Code Execution via preg_replace /e in Bug Update Emails
CVE-2026-25237
Description
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, use of preg_replace() with the /e modifier in bug update email handling can enable PHP code execution if attacker-controlled content reaches the evaluated replacement. This issue has been patched in version 1.33.0.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/pear/pearweb/security/advisories/GHSA-vhw6-hqh9-8r23mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.