CVE-2026-25238
📋 TL;DR
A SQL injection vulnerability in PEAR's bug subscription deletion feature allows attackers to execute arbitrary SQL commands by manipulating email values. This affects all PEAR installations prior to version 1.33.0 that use the bug subscription functionality. Attackers could potentially read, modify, or delete database contents.
💻 Affected Systems
- PEAR (PHP Extension and Application Repository)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data exfiltration, modification, or deletion; potential privilege escalation to execute arbitrary code on the database server.
Likely Case
Unauthorized access to bug tracking data, potential exposure of user information, and manipulation of bug subscription records.
If Mitigated
Limited impact to bug subscription functionality only, with proper input validation and database permissions restricting damage.
🎯 Exploit Status
Exploitation requires access to bug subscription deletion functionality. The vulnerability is in email parameter handling during subscription deletion.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.33.0
Vendor Advisory: https://github.com/pear/pearweb/security/advisories/GHSA-cv3c-27h5-7gmv
Restart Required: No
Instructions:
1. Update PEAR to version 1.33.0 or later using: pear upgrade pear
2. Verify the update completed successfully
3. No service restart required for PHP applications
🔧 Temporary Workarounds
Disable bug subscription functionality
allTemporarily disable the vulnerable bug subscription deletion feature until patching is possible
Implement input validation
allAdd email validation and parameterized queries to the bug subscription deletion code
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block SQL injection patterns in email parameters
- Restrict database user permissions to minimize potential damage from successful exploitation
🔍 How to Verify
Check if Vulnerable:
Check PEAR version with: pear version | grep 'PEAR Version'
Check Version:
pear version | grep 'PEAR Version'
Verify Fix Applied:
Confirm version is 1.33.0 or higher: pear version | grep 'PEAR Version'
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed bug subscription deletion attempts
- Suspicious email patterns in application logs
Network Indicators:
- Unusual database connection patterns from web server
- SQL error messages in HTTP responses
SIEM Query:
source="web_logs" AND ("bug subscription" OR "email=") AND (sql OR injection OR "' OR ")