PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, use of preg_replace() with the /e modifier in bug update email handling can enable PHP code execution if attacker-controlled content reaches the evaluated replacement. This issue has been patched in version 1.33.0.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 03 Feb 2026 19:00:00 +0000

Type Values Removed Values Added
Description PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, use of preg_replace() with the /e modifier in bug update email handling can enable PHP code execution if attacker-controlled content reaches the evaluated replacement. This issue has been patched in version 1.33.0.
Title PEAR is Vulnerable to PHP Code Execution via preg_replace /e in Bug Update Emails
Weaknesses CWE-624
References
Metrics cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-03T18:29:54.001Z

Reserved: 2026-01-30T14:44:47.329Z

Link: CVE-2026-25237

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-03T19:16:24.867

Modified: 2026-02-03T19:16:24.867

Link: CVE-2026-25237

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses