Vulnerability Details CVE-2026-25239
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, a SQL injection vulnerability in apidoc queue insertion can allow query manipulation if an attacker can influence the inserted filename value. This issue has been patched in version 1.33.0.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 8.2%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2026-25239
-
cpe:2.3:a:pear:pearweb:1.0.0
-
cpe:2.3:a:pear:pearweb:1.0.1
-
cpe:2.3:a:pear:pearweb:1.1.0
-
cpe:2.3:a:pear:pearweb:1.1.1
-
cpe:2.3:a:pear:pearweb:1.1.2
-
cpe:2.3:a:pear:pearweb:1.1.3
-
cpe:2.3:a:pear:pearweb:1.1.4
-
cpe:2.3:a:pear:pearweb:1.1.5
-
cpe:2.3:a:pear:pearweb:1.1.6
-
cpe:2.3:a:pear:pearweb:1.1.7
-
cpe:2.3:a:pear:pearweb:1.1.8
-
cpe:2.3:a:pear:pearweb:1.10.0
-
cpe:2.3:a:pear:pearweb:1.10.1
-
cpe:2.3:a:pear:pearweb:1.10.2
-
cpe:2.3:a:pear:pearweb:1.10.3
-
cpe:2.3:a:pear:pearweb:1.10.4
-
cpe:2.3:a:pear:pearweb:1.11.0
-
cpe:2.3:a:pear:pearweb:1.11.1
-
cpe:2.3:a:pear:pearweb:1.11.2
-
cpe:2.3:a:pear:pearweb:1.11.3
-
cpe:2.3:a:pear:pearweb:1.12.0
-
cpe:2.3:a:pear:pearweb:1.12.1
-
cpe:2.3:a:pear:pearweb:1.13.0
-
cpe:2.3:a:pear:pearweb:1.14.0
-
cpe:2.3:a:pear:pearweb:1.15.0
-
cpe:2.3:a:pear:pearweb:1.15.1
-
cpe:2.3:a:pear:pearweb:1.15.2
-
cpe:2.3:a:pear:pearweb:1.16.0
-
cpe:2.3:a:pear:pearweb:1.16.1
-
cpe:2.3:a:pear:pearweb:1.16.2
-
cpe:2.3:a:pear:pearweb:1.16.3
-
cpe:2.3:a:pear:pearweb:1.17.0
-
cpe:2.3:a:pear:pearweb:1.17.1
-
cpe:2.3:a:pear:pearweb:1.18.0
-
cpe:2.3:a:pear:pearweb:1.18.1
-
cpe:2.3:a:pear:pearweb:1.19.0
-
cpe:2.3:a:pear:pearweb:1.2.0
-
cpe:2.3:a:pear:pearweb:1.2.1
-
cpe:2.3:a:pear:pearweb:1.2.2
-
cpe:2.3:a:pear:pearweb:1.2.3
-
cpe:2.3:a:pear:pearweb:1.2.4
-
cpe:2.3:a:pear:pearweb:1.2.5
-
cpe:2.3:a:pear:pearweb:1.20.0
-
cpe:2.3:a:pear:pearweb:1.20.1
-
cpe:2.3:a:pear:pearweb:1.20.2
-
cpe:2.3:a:pear:pearweb:1.21.0
-
cpe:2.3:a:pear:pearweb:1.21.1
-
cpe:2.3:a:pear:pearweb:1.22.0
-
cpe:2.3:a:pear:pearweb:1.22.1
-
cpe:2.3:a:pear:pearweb:1.23.0
-
cpe:2.3:a:pear:pearweb:1.23.1
-
cpe:2.3:a:pear:pearweb:1.23.2
-
cpe:2.3:a:pear:pearweb:1.24.0
-
cpe:2.3:a:pear:pearweb:1.24.1
-
cpe:2.3:a:pear:pearweb:1.24.2
-
cpe:2.3:a:pear:pearweb:1.24.3
-
cpe:2.3:a:pear:pearweb:1.25.0
-
cpe:2.3:a:pear:pearweb:1.26.0
-
cpe:2.3:a:pear:pearweb:1.26.1
-
cpe:2.3:a:pear:pearweb:1.27.0
-
cpe:2.3:a:pear:pearweb:1.28.0
-
cpe:2.3:a:pear:pearweb:1.28.1
-
cpe:2.3:a:pear:pearweb:1.29.0
-
cpe:2.3:a:pear:pearweb:1.3.0
-
cpe:2.3:a:pear:pearweb:1.30.0
-
cpe:2.3:a:pear:pearweb:1.31.0
-
cpe:2.3:a:pear:pearweb:1.32.0
-
cpe:2.3:a:pear:pearweb:1.4.0
-
cpe:2.3:a:pear:pearweb:1.4.2
-
cpe:2.3:a:pear:pearweb:1.5.0
-
cpe:2.3:a:pear:pearweb:1.5.1
-
cpe:2.3:a:pear:pearweb:1.6.0
-
cpe:2.3:a:pear:pearweb:1.6.1
-
cpe:2.3:a:pear:pearweb:1.6.2
-
cpe:2.3:a:pear:pearweb:1.6.3
-
cpe:2.3:a:pear:pearweb:1.7.0
-
cpe:2.3:a:pear:pearweb:1.8.0
-
cpe:2.3:a:pear:pearweb:1.9.0
-
cpe:2.3:a:pear:pearweb:1.9.1
-
cpe:2.3:a:pear:pearweb:1.9.2
-
cpe:2.3:a:pear:pearweb:1.9.3
-
cpe:2.3:a:pear:pearweb:1.9.4
-
cpe:2.3:a:pear:pearweb:1.9.5
-
cpe:2.3:a:pear:pearweb:1.9.6