{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T11:42:27.546","vulnerabilities":[{"cve":{"id":"CVE-2026-23738","sourceIdentifier":"security-advisories@github.com","published":"2026-02-06T17:16:26.000","lastModified":"2026-02-18T18:42:48.877","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, user supplied/control values for Cookies and any GET variable query Parameter are directly interpolated into the HTML of the page using ast_str_append. The endpoint at GET /httpstatus is the potential vulnerable endpoint relating to asterisk/main /http.c. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2."},{"lang":"es","value":"Asterisk es una centralita privada y un kit de herramientas de telefonía de código abierto. Antes de las versiones 20.7-cert9, 20.18.2, 21.12.1, 22.8.2 y 23.2.2, los valores proporcionados/controlados por el usuario para las Cookies y cualquier parámetro de consulta de variable GET se interpolan directamente en el HTML de la página usando ast_str_append. El endpoint en GET /httpstatus es el endpoint potencialmente vulnerable relacionado con asterisk/main /http.c. Este problema ha sido parcheado en las versiones 20.7-cert9, 20.18.2, 21.12.1, 22.8.2 y 23.2.2."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","baseScore":3.5,"baseSeverity":"LOW","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*","versionEndIncluding":"20.18.2","matchCriteriaId":"55FE60C1-D6E7-40DE-A1E3-C37A8ED13BAA"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*","versionStartIncluding":"21.0.0","versionEndIncluding":"21.12.1","matchCriteriaId":"842D5FCD-E7A1-45AF-BC46-7C6CB03AE88E"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*","versionStartIncluding":"22.0.0","versionEndIncluding":"22.8.2","matchCriteriaId":"F12BA0F4-535F-409E-B2AB-84B703707055"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*","versionStartIncluding":"23.0.0","versionEndExcluding":"23.2.2","matchCriteriaId":"B036D768-9ADA-4965-A596-BEF60749C3CD"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:*:*:*:*:*:*:*:*","versionEndIncluding":"18.9","matchCriteriaId":"44460225-C50D-414A-A2E0-F8280E1C1E1D"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert1:*:*:*:*:*:*","matchCriteriaId":"79225576-AF7C-4099-9624-C53578A7417F"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert1-rc1:*:*:*:*:*:*","matchCriteriaId":"29323E6E-12C9-46C7-B29C-25E0CD537A8E"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert1-rc2:*:*:*:*:*:*","matchCriteriaId":"8E563972-78C0-40A0-83EA-6A3BA3D71946"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert2:*:*:*:*:*:*","matchCriteriaId":"64209621-D458-432A-B0E3-C8D0B6698574"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert3:*:*:*:*:*:*","matchCriteriaId":"B148158A-8354-41C2-A44C-2C0DAABAD217"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert4:*:*:*:*:*:*","matchCriteriaId":"3D4D96E8-1F01-42B8-9181-67DEB12D9DD2"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert5:*:*:*:*:*:*","matchCriteriaId":"50D1B02A-F5F9-48EB-A396-412821F5D602"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert6:*:*:*:*:*:*","matchCriteriaId":"4CBB2891-448F-4C4E-8A47-2283A8F71FE6"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert7:*:*:*:*:*:*","matchCriteriaId":"A9AF30E9-FC50-4A5C-BC99-9B3394488B9D"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert8:*:*:*:*:*:*","matchCriteriaId":"1A41366F-EA16-4867-A198-ACFFE5AFEA9A"}]}]}],"references":[{"url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-v6hp-wh3r-cwxh","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}