Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 05 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:pear:pearweb:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Wed, 04 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pear
Pear pearweb |
|
| Vendors & Products |
Pear
Pear pearweb |
Tue, 03 Feb 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, predictable verification hashes may allow attackers to guess verification tokens and potentially verify election account requests without authorization. This issue has been patched in version 1.33.0. | |
| Title | PEAR Has a Predictable Verification Hash in Election Account Requests | |
| Weaknesses | CWE-337 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-04T20:34:59.115Z
Reserved: 2026-01-30T14:44:47.328Z
Link: CVE-2026-25235
Updated: 2026-02-04T20:34:55.304Z
Status : Analyzed
Published: 2026-02-03T19:16:24.210
Modified: 2026-02-05T18:07:35.470
Link: CVE-2026-25235
No data.
OpenCVE Enrichment
Updated: 2026-02-04T12:05:45Z