CVE-2026-23739XML External Entity (XXE) Injection in Asterisk

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 82.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 6

Description

Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, the ast_xml_open() function in xml.c parses XML documents using libxml with unsafe parsing options that enable entity expansion and XInclude processing. Specifically, it invokes xmlReadFile() with the XML_PARSE_NOENT flag and later processes XIncludes via xmlXIncludeProcess().If any untrusted or user-supplied XML file is passed to this function, it can all

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages5 packages

debiandebian/asterisk< asterisk 1:16.28.0~dfsg-0+deb11u9 (bullseye)
NVDsangoma/asterisk21.0.021.12.1+3
CVEListV5asterisk/asterisk< 23.2.2+4
Debianasterisk/asterisk< 1:16.28.0~dfsg-0+deb11u9

🔴Vulnerability Details

1
OSV
CVE-2026-23739: Asterisk is an open source private branch exchange and telephony toolkit2026-02-06

📋Vendor Advisories

2
Red Hat
Asterisk: Asterisk: Local file disclosure via unsafe XML parsing2026-02-06
Debian
CVE-2026-23739: asterisk - Asterisk is an open source private branch exchange and telephony toolkit. Prior ...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23739 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23739 — XML External Entity (XXE) Injection | cvebase