Home

Description

Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, user supplied/control values for Cookies and any GET variable query Parameter are directly interpolated into the HTML of the page using ast_str_append. The endpoint at GET /httpstatus is the potential vulnerable endpoint relating to asterisk/main /http.c. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2.

PUBLISHED Reserved 2026-01-15 | Published 2026-02-06 | Updated 2026-02-06 | Assigner GitHub_M




LOW: 3.5CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 23.2.2
affected

< 22.8.2
affected

< 21.12.1
affected

< 20.18.2
affected

< 20.7-cert9
affected

References

github.com/...terisk/security/advisories/GHSA-v6hp-wh3r-cwxh

cve.org (CVE-2026-23738)

nvd.nist.gov (CVE-2026-23738)

Download JSON