ID

VAR-202602-1715


CVE

CVE-2026-23739


DESCRIPTION

Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, the ast_xml_open() function in xml.c parses XML documents using libxml with unsafe parsing options that enable entity expansion and XInclude processing. Specifically, it invokes xmlReadFile() with the XML_PARSE_NOENT flag and later processes XIncludes via xmlXIncludeProcess().If any untrusted or user-supplied XML file is passed to this function, it can allow an attacker to trigger XML External Entity (XXE) or XInclude-based local file disclosure, potentially exposing sensitive files from the host system. This can also be triggered in other cases in which the user is able to supply input in xml format that triggers the asterisk process to parse it. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2.

Trust: 1.0

sources: NVD: CVE-2026-23739

AFFECTED PRODUCTS

vendor:sangomamodel:asteriskscope:ltversion:23.2.2

Trust: 1.0

vendor:sangomamodel:certified asteriskscope:lteversion:18.9

Trust: 1.0

vendor:sangomamodel:asteriskscope:ltversion:21.12.1

Trust: 1.0

vendor:sangomamodel:asteriskscope:gteversion:21.0.0

Trust: 1.0

vendor:sangomamodel:asteriskscope:ltversion:20.18.2

Trust: 1.0

vendor:sangomamodel:asteriskscope:gteversion:23.0.0

Trust: 1.0

vendor:sangomamodel:asteriskscope:ltversion:22.8.2

Trust: 1.0

vendor:sangomamodel:certified asteriskscope:eqversion:20.7

Trust: 1.0

vendor:sangomamodel:asteriskscope:gteversion:22.0.0

Trust: 1.0

sources: NVD: CVE-2026-23739

CVSS

SEVERITY

CVSSV2

CVSSV3

security-advisories@github.com: CVE-2026-23739
value: LOW

Trust: 1.0

nvd@nist.gov: CVE-2026-23739
value: MEDIUM

Trust: 1.0

security-advisories@github.com: CVE-2026-23739
baseSeverity: LOW
baseScore: 2.0
vectorString: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 0.5
impactScore: 1.4
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2026-23739
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: NVD: CVE-2026-23739 // NVD: CVE-2026-23739

PROBLEMTYPE DATA

problemtype:CWE-611

Trust: 1.0

sources: NVD: CVE-2026-23739

EXTERNAL IDS

db:NVDid:CVE-2026-23739

Trust: 1.0

sources: NVD: CVE-2026-23739

REFERENCES

url:https://github.com/asterisk/asterisk/security/advisories/ghsa-85x7-54wr-vh42

Trust: 1.0

sources: NVD: CVE-2026-23739

SOURCES

db:NVDid:CVE-2026-23739

LAST UPDATE DATE

2026-02-19T23:41:32.916000+00:00


SOURCES UPDATE DATE

db:NVDid:CVE-2026-23739date:2026-02-18T18:42:37.300

SOURCES RELEASE DATE

db:NVDid:CVE-2026-23739date:2026-02-06T17:16:26.147