Vulnerability Details CVE-2026-25241
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, an unauthenticated SQL injection in the /get/<package>/<version> endpoint allows remote attackers to execute arbitrary SQL via a crafted package version. This issue has been patched in version 1.33.0.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 29.0%
CVSS Severity
CVSS v3 Score 9.8
Products affected by CVE-2026-25241
-
cpe:2.3:a:pear:pearweb:1.0.0
-
cpe:2.3:a:pear:pearweb:1.0.1
-
cpe:2.3:a:pear:pearweb:1.1.0
-
cpe:2.3:a:pear:pearweb:1.1.1
-
cpe:2.3:a:pear:pearweb:1.1.2
-
cpe:2.3:a:pear:pearweb:1.1.3
-
cpe:2.3:a:pear:pearweb:1.1.4
-
cpe:2.3:a:pear:pearweb:1.1.5
-
cpe:2.3:a:pear:pearweb:1.1.6
-
cpe:2.3:a:pear:pearweb:1.1.7
-
cpe:2.3:a:pear:pearweb:1.1.8
-
cpe:2.3:a:pear:pearweb:1.10.0
-
cpe:2.3:a:pear:pearweb:1.10.1
-
cpe:2.3:a:pear:pearweb:1.10.2
-
cpe:2.3:a:pear:pearweb:1.10.3
-
cpe:2.3:a:pear:pearweb:1.10.4
-
cpe:2.3:a:pear:pearweb:1.11.0
-
cpe:2.3:a:pear:pearweb:1.11.1
-
cpe:2.3:a:pear:pearweb:1.11.2
-
cpe:2.3:a:pear:pearweb:1.11.3
-
cpe:2.3:a:pear:pearweb:1.12.0
-
cpe:2.3:a:pear:pearweb:1.12.1
-
cpe:2.3:a:pear:pearweb:1.13.0
-
cpe:2.3:a:pear:pearweb:1.14.0
-
cpe:2.3:a:pear:pearweb:1.15.0
-
cpe:2.3:a:pear:pearweb:1.15.1
-
cpe:2.3:a:pear:pearweb:1.15.2
-
cpe:2.3:a:pear:pearweb:1.16.0
-
cpe:2.3:a:pear:pearweb:1.16.1
-
cpe:2.3:a:pear:pearweb:1.16.2
-
cpe:2.3:a:pear:pearweb:1.16.3
-
cpe:2.3:a:pear:pearweb:1.17.0
-
cpe:2.3:a:pear:pearweb:1.17.1
-
cpe:2.3:a:pear:pearweb:1.18.0
-
cpe:2.3:a:pear:pearweb:1.18.1
-
cpe:2.3:a:pear:pearweb:1.19.0
-
cpe:2.3:a:pear:pearweb:1.2.0
-
cpe:2.3:a:pear:pearweb:1.2.1
-
cpe:2.3:a:pear:pearweb:1.2.2
-
cpe:2.3:a:pear:pearweb:1.2.3
-
cpe:2.3:a:pear:pearweb:1.2.4
-
cpe:2.3:a:pear:pearweb:1.2.5
-
cpe:2.3:a:pear:pearweb:1.20.0
-
cpe:2.3:a:pear:pearweb:1.20.1
-
cpe:2.3:a:pear:pearweb:1.20.2
-
cpe:2.3:a:pear:pearweb:1.21.0
-
cpe:2.3:a:pear:pearweb:1.21.1
-
cpe:2.3:a:pear:pearweb:1.22.0
-
cpe:2.3:a:pear:pearweb:1.22.1
-
cpe:2.3:a:pear:pearweb:1.23.0
-
cpe:2.3:a:pear:pearweb:1.23.1
-
cpe:2.3:a:pear:pearweb:1.23.2
-
cpe:2.3:a:pear:pearweb:1.24.0
-
cpe:2.3:a:pear:pearweb:1.24.1
-
cpe:2.3:a:pear:pearweb:1.24.2
-
cpe:2.3:a:pear:pearweb:1.24.3
-
cpe:2.3:a:pear:pearweb:1.25.0
-
cpe:2.3:a:pear:pearweb:1.26.0
-
cpe:2.3:a:pear:pearweb:1.26.1
-
cpe:2.3:a:pear:pearweb:1.27.0
-
cpe:2.3:a:pear:pearweb:1.28.0
-
cpe:2.3:a:pear:pearweb:1.28.1
-
cpe:2.3:a:pear:pearweb:1.29.0
-
cpe:2.3:a:pear:pearweb:1.3.0
-
cpe:2.3:a:pear:pearweb:1.30.0
-
cpe:2.3:a:pear:pearweb:1.31.0
-
cpe:2.3:a:pear:pearweb:1.32.0
-
cpe:2.3:a:pear:pearweb:1.4.0
-
cpe:2.3:a:pear:pearweb:1.4.2
-
cpe:2.3:a:pear:pearweb:1.5.0
-
cpe:2.3:a:pear:pearweb:1.5.1
-
cpe:2.3:a:pear:pearweb:1.6.0
-
cpe:2.3:a:pear:pearweb:1.6.1
-
cpe:2.3:a:pear:pearweb:1.6.2
-
cpe:2.3:a:pear:pearweb:1.6.3
-
cpe:2.3:a:pear:pearweb:1.7.0
-
cpe:2.3:a:pear:pearweb:1.8.0
-
cpe:2.3:a:pear:pearweb:1.9.0
-
cpe:2.3:a:pear:pearweb:1.9.1
-
cpe:2.3:a:pear:pearweb:1.9.2
-
cpe:2.3:a:pear:pearweb:1.9.3
-
cpe:2.3:a:pear:pearweb:1.9.4
-
cpe:2.3:a:pear:pearweb:1.9.5
-
cpe:2.3:a:pear:pearweb:1.9.6