PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, predictable verification hashes may allow attackers to guess verification tokens and potentially verify election account requests without authorization. This issue has been patched in version 1.33.0.
References
| Link | Resource |
|---|---|
| https://github.com/pear/pearweb/security/advisories/GHSA-477r-4cmw-3cgf | Vendor Advisory |
Configurations
History
05 Feb 2026, 18:07
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Pear
Pear pearweb |
|
| CPE | cpe:2.3:a:pear:pearweb:*:*:*:*:*:*:*:* | |
| References | () https://github.com/pear/pearweb/security/advisories/GHSA-477r-4cmw-3cgf - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
03 Feb 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-03 19:16
Updated : 2026-02-05 18:07
NVD link : CVE-2026-25235
Mitre link : CVE-2026-25235
CVE.ORG link : CVE-2026-25235
JSON object : View
Products Affected
pear
- pearweb
CWE
CWE-337
Predictable Seed in Pseudo-Random Number Generator (PRNG)
