CVE-2026-23738Cross-site Scripting in Asterisk

Severity
6.1MEDIUMNVD
EPSS
0.1%
top 84.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 6

Description

Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, user supplied/control values for Cookies and any GET variable query Parameter are directly interpolated into the HTML of the page using ast_str_append. The endpoint at GET /httpstatus is the potential vulnerable endpoint relating to asterisk/main /http.c. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

Affected Packages5 packages

debiandebian/asterisk< asterisk 1:16.28.0~dfsg-0+deb11u9 (bullseye)
NVDsangoma/asterisk23.0.023.2.2+3
CVEListV5asterisk/asterisk< 23.2.2+4
Debianasterisk/asterisk< 1:16.28.0~dfsg-0+deb11u9

🔴Vulnerability Details

1
OSV
CVE-2026-23738: Asterisk is an open source private branch exchange and telephony toolkit2026-02-06

📋Vendor Advisories

1
Debian
CVE-2026-23738: asterisk - Asterisk is an open source private branch exchange and telephony toolkit. Prior ...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23738 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23738 — Cross-site Scripting in Asterisk | cvebase