Pear Security Vulnerabilities (CVEs)
Track 9 security vulnerabilities affecting Pear products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
This SQL injection vulnerability in PEAR's user::maintains() function allows attackers to execute arbitrary SQL commands when role filters are provide...
Feb 3, 2026This CVE describes an unauthenticated SQL injection vulnerability in PEAR's package retrieval endpoint. Attackers can execute arbitrary SQL commands b...
Feb 3, 2026A SQL injection vulnerability in PEAR's bug subscription deletion feature allows attackers to execute arbitrary SQL commands by manipulating email val...
Feb 3, 2026This SQL injection vulnerability in PEAR's apidoc queue insertion allows attackers to manipulate database queries by controlling filename values. It a...
Feb 3, 2026This vulnerability in PEAR (PHP Extension and Application Repository) allows attackers to guess verification tokens due to predictable hashes, potenti...
Feb 3, 2026This CVE describes a SQL injection vulnerability in PEAR, a PHP component framework, where unsafe literal substitution in karma queries allows attacke...
Feb 3, 2026This vulnerability in PEAR (PHP Extension and Application Repository) allows remote code execution when attacker-controlled content reaches the preg_r...
Feb 3, 2026This SQL injection vulnerability in PEAR's category deletion function allows attackers with category manager access to execute arbitrary SQL commands....
Feb 3, 2026This vulnerability in PEAR (PHP Extension and Application Repository) allows non-lead maintainers to create, update, or delete roadmaps due to a logic...
Feb 3, 2026Why Monitor Pear Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 9+ known vulnerabilities affecting Pear products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Pear packages in under 60 seconds. No agents required - completely agentless scanning that works across Pear deployments.
Free vulnerability database: Access detailed information about every Pear CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Pear CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions