Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4515-1 | asterisk security update |
Wed, 18 Feb 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sangoma
Sangoma asterisk Sangoma certified Asterisk |
|
| CPEs | cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:*:*:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert1-rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert1-rc2:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert1:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert2:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert3:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert4:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert5:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert6:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert7:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert8:*:*:*:*:*:* |
|
| Vendors & Products |
Sangoma
Sangoma asterisk Sangoma certified Asterisk |
Mon, 09 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Asterisk
Asterisk asterisk |
|
| Vendors & Products |
Asterisk
Asterisk asterisk |
Fri, 06 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Feb 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, user supplied/control values for Cookies and any GET variable query Parameter are directly interpolated into the HTML of the page using ast_str_append. The endpoint at GET /httpstatus is the potential vulnerable endpoint relating to asterisk/main /http.c. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2. | |
| Title | The Asterisk embedded web server 's /httpstatus page echos user supplied values(cookie and query string) without sanitization | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-06T17:44:20.480Z
Reserved: 2026-01-15T15:45:01.957Z
Link: CVE-2026-23738
Updated: 2026-02-06T17:44:13.843Z
Status : Analyzed
Published: 2026-02-06T17:16:26.000
Modified: 2026-02-18T18:42:48.877
Link: CVE-2026-23738
No data.
OpenCVE Enrichment
Updated: 2026-04-17T22:45:29Z
Debian DLA