Vulnerability Details CVE-2026-25235
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, predictable verification hashes may allow attackers to guess verification tokens and potentially verify election account requests without authorization. This issue has been patched in version 1.33.0.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 12.7%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2026-25235
-
cpe:2.3:a:pear:pearweb:1.0.0
-
cpe:2.3:a:pear:pearweb:1.0.1
-
cpe:2.3:a:pear:pearweb:1.1.0
-
cpe:2.3:a:pear:pearweb:1.1.1
-
cpe:2.3:a:pear:pearweb:1.1.2
-
cpe:2.3:a:pear:pearweb:1.1.3
-
cpe:2.3:a:pear:pearweb:1.1.4
-
cpe:2.3:a:pear:pearweb:1.1.5
-
cpe:2.3:a:pear:pearweb:1.1.6
-
cpe:2.3:a:pear:pearweb:1.1.7
-
cpe:2.3:a:pear:pearweb:1.1.8
-
cpe:2.3:a:pear:pearweb:1.10.0
-
cpe:2.3:a:pear:pearweb:1.10.1
-
cpe:2.3:a:pear:pearweb:1.10.2
-
cpe:2.3:a:pear:pearweb:1.10.3
-
cpe:2.3:a:pear:pearweb:1.10.4
-
cpe:2.3:a:pear:pearweb:1.11.0
-
cpe:2.3:a:pear:pearweb:1.11.1
-
cpe:2.3:a:pear:pearweb:1.11.2
-
cpe:2.3:a:pear:pearweb:1.11.3
-
cpe:2.3:a:pear:pearweb:1.12.0
-
cpe:2.3:a:pear:pearweb:1.12.1
-
cpe:2.3:a:pear:pearweb:1.13.0
-
cpe:2.3:a:pear:pearweb:1.14.0
-
cpe:2.3:a:pear:pearweb:1.15.0
-
cpe:2.3:a:pear:pearweb:1.15.1
-
cpe:2.3:a:pear:pearweb:1.15.2
-
cpe:2.3:a:pear:pearweb:1.16.0
-
cpe:2.3:a:pear:pearweb:1.16.1
-
cpe:2.3:a:pear:pearweb:1.16.2
-
cpe:2.3:a:pear:pearweb:1.16.3
-
cpe:2.3:a:pear:pearweb:1.17.0
-
cpe:2.3:a:pear:pearweb:1.17.1
-
cpe:2.3:a:pear:pearweb:1.18.0
-
cpe:2.3:a:pear:pearweb:1.18.1
-
cpe:2.3:a:pear:pearweb:1.19.0
-
cpe:2.3:a:pear:pearweb:1.2.0
-
cpe:2.3:a:pear:pearweb:1.2.1
-
cpe:2.3:a:pear:pearweb:1.2.2
-
cpe:2.3:a:pear:pearweb:1.2.3
-
cpe:2.3:a:pear:pearweb:1.2.4
-
cpe:2.3:a:pear:pearweb:1.2.5
-
cpe:2.3:a:pear:pearweb:1.20.0
-
cpe:2.3:a:pear:pearweb:1.20.1
-
cpe:2.3:a:pear:pearweb:1.20.2
-
cpe:2.3:a:pear:pearweb:1.21.0
-
cpe:2.3:a:pear:pearweb:1.21.1
-
cpe:2.3:a:pear:pearweb:1.22.0
-
cpe:2.3:a:pear:pearweb:1.22.1
-
cpe:2.3:a:pear:pearweb:1.23.0
-
cpe:2.3:a:pear:pearweb:1.23.1
-
cpe:2.3:a:pear:pearweb:1.23.2
-
cpe:2.3:a:pear:pearweb:1.24.0
-
cpe:2.3:a:pear:pearweb:1.24.1
-
cpe:2.3:a:pear:pearweb:1.24.2
-
cpe:2.3:a:pear:pearweb:1.24.3
-
cpe:2.3:a:pear:pearweb:1.25.0
-
cpe:2.3:a:pear:pearweb:1.26.0
-
cpe:2.3:a:pear:pearweb:1.26.1
-
cpe:2.3:a:pear:pearweb:1.27.0
-
cpe:2.3:a:pear:pearweb:1.28.0
-
cpe:2.3:a:pear:pearweb:1.28.1
-
cpe:2.3:a:pear:pearweb:1.29.0
-
cpe:2.3:a:pear:pearweb:1.3.0
-
cpe:2.3:a:pear:pearweb:1.30.0
-
cpe:2.3:a:pear:pearweb:1.31.0
-
cpe:2.3:a:pear:pearweb:1.32.0
-
cpe:2.3:a:pear:pearweb:1.4.0
-
cpe:2.3:a:pear:pearweb:1.4.2
-
cpe:2.3:a:pear:pearweb:1.5.0
-
cpe:2.3:a:pear:pearweb:1.5.1
-
cpe:2.3:a:pear:pearweb:1.6.0
-
cpe:2.3:a:pear:pearweb:1.6.1
-
cpe:2.3:a:pear:pearweb:1.6.2
-
cpe:2.3:a:pear:pearweb:1.6.3
-
cpe:2.3:a:pear:pearweb:1.7.0
-
cpe:2.3:a:pear:pearweb:1.8.0
-
cpe:2.3:a:pear:pearweb:1.9.0
-
cpe:2.3:a:pear:pearweb:1.9.1
-
cpe:2.3:a:pear:pearweb:1.9.2
-
cpe:2.3:a:pear:pearweb:1.9.3
-
cpe:2.3:a:pear:pearweb:1.9.4
-
cpe:2.3:a:pear:pearweb:1.9.5
-
cpe:2.3:a:pear:pearweb:1.9.6