Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, user supplied/control values for Cookies and any GET variable query Parameter are directly interpolated into the HTML of the page using ast_str_append. The endpoint at GET /httpstatus is the potential vulnerable endpoint relating to asterisk/main /http.c. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2.
References
| Link | Resource |
|---|---|
| https://github.com/asterisk/asterisk/security/advisories/GHSA-v6hp-wh3r-cwxh | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
18 Feb 2026, 18:42
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/asterisk/asterisk/security/advisories/GHSA-v6hp-wh3r-cwxh - Vendor Advisory | |
| First Time |
Sangoma asterisk
Sangoma Sangoma certified Asterisk |
|
| CPE | cpe:2.3:a:sangoma:certified_asterisk:20.7:cert7:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert3:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert8:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert1-rc2:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert6:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:*:*:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert4:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert5:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert1:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert2:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert1-rc1:*:*:*:*:*:* |
06 Feb 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-06 17:16
Updated : 2026-02-18 18:42
NVD link : CVE-2026-23738
Mitre link : CVE-2026-23738
CVE.ORG link : CVE-2026-23738
JSON object : View
Products Affected
sangoma
- asterisk
- certified_asterisk
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
