Vulnerability Details CVE-2026-25240
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, a SQL injection vulnerability can occur in user::maintains() when role filters are provided as an array and interpolated into an IN (...) clause. This issue has been patched in version 1.33.0.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 8.2%
CVSS Severity
CVSS v3 Score 9.8
Products affected by CVE-2026-25240
-
cpe:2.3:a:pear:pearweb:1.0.0
-
cpe:2.3:a:pear:pearweb:1.0.1
-
cpe:2.3:a:pear:pearweb:1.1.0
-
cpe:2.3:a:pear:pearweb:1.1.1
-
cpe:2.3:a:pear:pearweb:1.1.2
-
cpe:2.3:a:pear:pearweb:1.1.3
-
cpe:2.3:a:pear:pearweb:1.1.4
-
cpe:2.3:a:pear:pearweb:1.1.5
-
cpe:2.3:a:pear:pearweb:1.1.6
-
cpe:2.3:a:pear:pearweb:1.1.7
-
cpe:2.3:a:pear:pearweb:1.1.8
-
cpe:2.3:a:pear:pearweb:1.10.0
-
cpe:2.3:a:pear:pearweb:1.10.1
-
cpe:2.3:a:pear:pearweb:1.10.2
-
cpe:2.3:a:pear:pearweb:1.10.3
-
cpe:2.3:a:pear:pearweb:1.10.4
-
cpe:2.3:a:pear:pearweb:1.11.0
-
cpe:2.3:a:pear:pearweb:1.11.1
-
cpe:2.3:a:pear:pearweb:1.11.2
-
cpe:2.3:a:pear:pearweb:1.11.3
-
cpe:2.3:a:pear:pearweb:1.12.0
-
cpe:2.3:a:pear:pearweb:1.12.1
-
cpe:2.3:a:pear:pearweb:1.13.0
-
cpe:2.3:a:pear:pearweb:1.14.0
-
cpe:2.3:a:pear:pearweb:1.15.0
-
cpe:2.3:a:pear:pearweb:1.15.1
-
cpe:2.3:a:pear:pearweb:1.15.2
-
cpe:2.3:a:pear:pearweb:1.16.0
-
cpe:2.3:a:pear:pearweb:1.16.1
-
cpe:2.3:a:pear:pearweb:1.16.2
-
cpe:2.3:a:pear:pearweb:1.16.3
-
cpe:2.3:a:pear:pearweb:1.17.0
-
cpe:2.3:a:pear:pearweb:1.17.1
-
cpe:2.3:a:pear:pearweb:1.18.0
-
cpe:2.3:a:pear:pearweb:1.18.1
-
cpe:2.3:a:pear:pearweb:1.19.0
-
cpe:2.3:a:pear:pearweb:1.2.0
-
cpe:2.3:a:pear:pearweb:1.2.1
-
cpe:2.3:a:pear:pearweb:1.2.2
-
cpe:2.3:a:pear:pearweb:1.2.3
-
cpe:2.3:a:pear:pearweb:1.2.4
-
cpe:2.3:a:pear:pearweb:1.2.5
-
cpe:2.3:a:pear:pearweb:1.20.0
-
cpe:2.3:a:pear:pearweb:1.20.1
-
cpe:2.3:a:pear:pearweb:1.20.2
-
cpe:2.3:a:pear:pearweb:1.21.0
-
cpe:2.3:a:pear:pearweb:1.21.1
-
cpe:2.3:a:pear:pearweb:1.22.0
-
cpe:2.3:a:pear:pearweb:1.22.1
-
cpe:2.3:a:pear:pearweb:1.23.0
-
cpe:2.3:a:pear:pearweb:1.23.1
-
cpe:2.3:a:pear:pearweb:1.23.2
-
cpe:2.3:a:pear:pearweb:1.24.0
-
cpe:2.3:a:pear:pearweb:1.24.1
-
cpe:2.3:a:pear:pearweb:1.24.2
-
cpe:2.3:a:pear:pearweb:1.24.3
-
cpe:2.3:a:pear:pearweb:1.25.0
-
cpe:2.3:a:pear:pearweb:1.26.0
-
cpe:2.3:a:pear:pearweb:1.26.1
-
cpe:2.3:a:pear:pearweb:1.27.0
-
cpe:2.3:a:pear:pearweb:1.28.0
-
cpe:2.3:a:pear:pearweb:1.28.1
-
cpe:2.3:a:pear:pearweb:1.29.0
-
cpe:2.3:a:pear:pearweb:1.3.0
-
cpe:2.3:a:pear:pearweb:1.30.0
-
cpe:2.3:a:pear:pearweb:1.31.0
-
cpe:2.3:a:pear:pearweb:1.32.0
-
cpe:2.3:a:pear:pearweb:1.4.0
-
cpe:2.3:a:pear:pearweb:1.4.2
-
cpe:2.3:a:pear:pearweb:1.5.0
-
cpe:2.3:a:pear:pearweb:1.5.1
-
cpe:2.3:a:pear:pearweb:1.6.0
-
cpe:2.3:a:pear:pearweb:1.6.1
-
cpe:2.3:a:pear:pearweb:1.6.2
-
cpe:2.3:a:pear:pearweb:1.6.3
-
cpe:2.3:a:pear:pearweb:1.7.0
-
cpe:2.3:a:pear:pearweb:1.8.0
-
cpe:2.3:a:pear:pearweb:1.9.0
-
cpe:2.3:a:pear:pearweb:1.9.1
-
cpe:2.3:a:pear:pearweb:1.9.2
-
cpe:2.3:a:pear:pearweb:1.9.3
-
cpe:2.3:a:pear:pearweb:1.9.4
-
cpe:2.3:a:pear:pearweb:1.9.5
-
cpe:2.3:a:pear:pearweb:1.9.6