CVE-2026-25235

PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, predictable verification hashes may allow attackers to guess verification tokens and potentially verify election account requests without authorization. This issue has been patched in version 1.33.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pear:pearweb:*:*:*:*:*:*:*:*

History

05 Feb 2026, 18:07

Type Values Removed Values Added
First Time Pear
Pear pearweb
CPE cpe:2.3:a:pear:pearweb:*:*:*:*:*:*:*:*
References () https://github.com/pear/pearweb/security/advisories/GHSA-477r-4cmw-3cgf - () https://github.com/pear/pearweb/security/advisories/GHSA-477r-4cmw-3cgf - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

03 Feb 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-03 19:16

Updated : 2026-02-05 18:07


NVD link : CVE-2026-25235

Mitre link : CVE-2026-25235

CVE.ORG link : CVE-2026-25235


JSON object : View

Products Affected

pear

  • pearweb
CWE
CWE-337

Predictable Seed in Pseudo-Random Number Generator (PRNG)