Vulnerability Details CVE-2026-25236
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, a SQL injection risk exists in karma queries due to unsafe literal substitution for an IN (...) list. This issue has been patched in version 1.33.0.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 8.2%
CVSS Severity
CVSS v3 Score 9.8
Products affected by CVE-2026-25236
-
cpe:2.3:a:pear:pearweb:1.0.0
-
cpe:2.3:a:pear:pearweb:1.0.1
-
cpe:2.3:a:pear:pearweb:1.1.0
-
cpe:2.3:a:pear:pearweb:1.1.1
-
cpe:2.3:a:pear:pearweb:1.1.2
-
cpe:2.3:a:pear:pearweb:1.1.3
-
cpe:2.3:a:pear:pearweb:1.1.4
-
cpe:2.3:a:pear:pearweb:1.1.5
-
cpe:2.3:a:pear:pearweb:1.1.6
-
cpe:2.3:a:pear:pearweb:1.1.7
-
cpe:2.3:a:pear:pearweb:1.1.8
-
cpe:2.3:a:pear:pearweb:1.10.0
-
cpe:2.3:a:pear:pearweb:1.10.1
-
cpe:2.3:a:pear:pearweb:1.10.2
-
cpe:2.3:a:pear:pearweb:1.10.3
-
cpe:2.3:a:pear:pearweb:1.10.4
-
cpe:2.3:a:pear:pearweb:1.11.0
-
cpe:2.3:a:pear:pearweb:1.11.1
-
cpe:2.3:a:pear:pearweb:1.11.2
-
cpe:2.3:a:pear:pearweb:1.11.3
-
cpe:2.3:a:pear:pearweb:1.12.0
-
cpe:2.3:a:pear:pearweb:1.12.1
-
cpe:2.3:a:pear:pearweb:1.13.0
-
cpe:2.3:a:pear:pearweb:1.14.0
-
cpe:2.3:a:pear:pearweb:1.15.0
-
cpe:2.3:a:pear:pearweb:1.15.1
-
cpe:2.3:a:pear:pearweb:1.15.2
-
cpe:2.3:a:pear:pearweb:1.16.0
-
cpe:2.3:a:pear:pearweb:1.16.1
-
cpe:2.3:a:pear:pearweb:1.16.2
-
cpe:2.3:a:pear:pearweb:1.16.3
-
cpe:2.3:a:pear:pearweb:1.17.0
-
cpe:2.3:a:pear:pearweb:1.17.1
-
cpe:2.3:a:pear:pearweb:1.18.0
-
cpe:2.3:a:pear:pearweb:1.18.1
-
cpe:2.3:a:pear:pearweb:1.19.0
-
cpe:2.3:a:pear:pearweb:1.2.0
-
cpe:2.3:a:pear:pearweb:1.2.1
-
cpe:2.3:a:pear:pearweb:1.2.2
-
cpe:2.3:a:pear:pearweb:1.2.3
-
cpe:2.3:a:pear:pearweb:1.2.4
-
cpe:2.3:a:pear:pearweb:1.2.5
-
cpe:2.3:a:pear:pearweb:1.20.0
-
cpe:2.3:a:pear:pearweb:1.20.1
-
cpe:2.3:a:pear:pearweb:1.20.2
-
cpe:2.3:a:pear:pearweb:1.21.0
-
cpe:2.3:a:pear:pearweb:1.21.1
-
cpe:2.3:a:pear:pearweb:1.22.0
-
cpe:2.3:a:pear:pearweb:1.22.1
-
cpe:2.3:a:pear:pearweb:1.23.0
-
cpe:2.3:a:pear:pearweb:1.23.1
-
cpe:2.3:a:pear:pearweb:1.23.2
-
cpe:2.3:a:pear:pearweb:1.24.0
-
cpe:2.3:a:pear:pearweb:1.24.1
-
cpe:2.3:a:pear:pearweb:1.24.2
-
cpe:2.3:a:pear:pearweb:1.24.3
-
cpe:2.3:a:pear:pearweb:1.25.0
-
cpe:2.3:a:pear:pearweb:1.26.0
-
cpe:2.3:a:pear:pearweb:1.26.1
-
cpe:2.3:a:pear:pearweb:1.27.0
-
cpe:2.3:a:pear:pearweb:1.28.0
-
cpe:2.3:a:pear:pearweb:1.28.1
-
cpe:2.3:a:pear:pearweb:1.29.0
-
cpe:2.3:a:pear:pearweb:1.3.0
-
cpe:2.3:a:pear:pearweb:1.30.0
-
cpe:2.3:a:pear:pearweb:1.31.0
-
cpe:2.3:a:pear:pearweb:1.32.0
-
cpe:2.3:a:pear:pearweb:1.4.0
-
cpe:2.3:a:pear:pearweb:1.4.2
-
cpe:2.3:a:pear:pearweb:1.5.0
-
cpe:2.3:a:pear:pearweb:1.5.1
-
cpe:2.3:a:pear:pearweb:1.6.0
-
cpe:2.3:a:pear:pearweb:1.6.1
-
cpe:2.3:a:pear:pearweb:1.6.2
-
cpe:2.3:a:pear:pearweb:1.6.3
-
cpe:2.3:a:pear:pearweb:1.7.0
-
cpe:2.3:a:pear:pearweb:1.8.0
-
cpe:2.3:a:pear:pearweb:1.9.0
-
cpe:2.3:a:pear:pearweb:1.9.1
-
cpe:2.3:a:pear:pearweb:1.9.2
-
cpe:2.3:a:pear:pearweb:1.9.3
-
cpe:2.3:a:pear:pearweb:1.9.4
-
cpe:2.3:a:pear:pearweb:1.9.5
-
cpe:2.3:a:pear:pearweb:1.9.6