PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, predictable verification hashes may allow attackers to guess verification tokens and potentially verify election account requests without authorization. This issue has been patched in version 1.33.0.
Metrics
Affected Vendors & Products
References
History
Wed, 04 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pear
Pear pearweb |
|
| Vendors & Products |
Pear
Pear pearweb |
Tue, 03 Feb 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, predictable verification hashes may allow attackers to guess verification tokens and potentially verify election account requests without authorization. This issue has been patched in version 1.33.0. | |
| Title | PEAR Has a Predictable Verification Hash in Election Account Requests | |
| Weaknesses | CWE-337 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-02-03T18:29:39.698Z
Updated: 2026-02-04T20:34:59.115Z
Reserved: 2026-01-30T14:44:47.328Z
Link: CVE-2026-25235
Updated: 2026-02-04T20:34:55.304Z
Status : Awaiting Analysis
Published: 2026-02-03T19:16:24.210
Modified: 2026-02-04T16:33:44.537
Link: CVE-2026-25235
No data.