CVE-2026-25237

PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, use of preg_replace() with the /e modifier in bug update email handling can enable PHP code execution if attacker-controlled content reaches the evaluated replacement. This issue has been patched in version 1.33.0.
CVSS

No CVSS.

Configurations

No configuration.

History

03 Feb 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-03 19:16

Updated : 2026-02-03 19:16


NVD link : CVE-2026-25237

Mitre link : CVE-2026-25237

CVE.ORG link : CVE-2026-25237


JSON object : View

Products Affected

No product.

CWE
CWE-624

Executable Regular Expression Error