{"id":"CVE-2026-25237","summary":"PEAR is Vulnerable to PHP Code Execution via preg_replace /e in Bug Update Emails","details":"PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, use of preg_replace() with the /e modifier in bug update email handling can enable PHP code execution if attacker-controlled content reaches the evaluated replacement. This issue has been patched in version 1.33.0.","aliases":["GHSA-vhw6-hqh9-8r23"],"modified":"2026-04-10T05:40:10.357353Z","published":"2026-02-03T18:29:54.001Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25237.json","cwe_ids":["CWE-624"],"cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25237.json"},{"type":"ADVISORY","url":"https://github.com/pear/pearweb/security/advisories/GHSA-vhw6-hqh9-8r23"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-25237"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/pear/pearweb","events":[{"introduced":"0"},{"fixed":"e25236d3e32823f102865005ac54c4669072fc75"}]}],"versions":["pearweb-1.26.1","pearweb-1.28.1","pearweb-1.29.0","pearweb-1.32.0","pearweb_index-1.22.2","pearweb_index-1.23.1","pearweb_index-1.24.0","pearweb_manual-1.2.3","pearweb_manual-1.3.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25237.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}]}