Skip to content

Add CVE-2026-25241 - PEAR pearweb Unauthenticated SQL Injection#15225

Open
hevnsnt wants to merge 1 commit intoprojectdiscovery:mainfrom
hevnsnt:add-cve-2026-25241
Open

Add CVE-2026-25241 - PEAR pearweb Unauthenticated SQL Injection#15225
hevnsnt wants to merge 1 commit intoprojectdiscovery:mainfrom
hevnsnt:add-cve-2026-25241

Conversation

@hevnsnt
Copy link

@hevnsnt hevnsnt commented Feb 7, 2026

Template Overview

This template detects CVE-2026-25241, an unauthenticated SQL injection vulnerability in PEAR pearweb versions prior to 1.33.0.

Vulnerability Details

Product: PEAR pearweb
Affected Versions: < 1.33.0
Severity: Critical (CVSS 9.8)
CWE: CWE-89 (SQL Injection)

The /get/<package>/<version> endpoint does not properly sanitize the version parameter before including it in a SQL query. This allows remote, unauthenticated attackers to inject arbitrary SQL statements and potentially extract or modify database contents.

Detection Method

The template uses a time-based blind SQL injection technique, injecting a SLEEP(6) payload into the version parameter and measuring response delay to confirm the vulnerability without causing harm to the target.

References

@theamanrawat
Copy link
Contributor

Hi @hevnsnt,

Thank you so much for sharing this template with the community and contributing to this project 🍻

Does the endpoint /get/<package>/<version> require the package name to be exploited? You mentioned the package name as 'test' in the template, but this might not work for others because the package name can be different.

Do you have additional information to identify the package name?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants