A flaw was found in the `github.com/antchfx/xpath` component. A remote attacker could exploit this vulnerability by submitting crafted Boolean XPath expressions that evaluate to true. This can cause an infinite loop in the `logicalQuery.Select` function, leading to 100% CPU utilization and a Denial of Service (DoS) condition for the affected system.

Project Subscriptions

Vendors Products
Enterprise Linux Subscribe
Migration Toolkit Applications Subscribe
Openshift Subscribe
Openshift Compliance Operator Subscribe
Openshift Distributed Tracing Subscribe
Openshift File Integrity Operator Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 23 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
Description A flaw was found in the `github.com/antchfx/xpath` component. A remote attacker could exploit this vulnerability by submitting crafted Boolean XPath expressions that evaluate to true. This can cause an infinite loop in the `logicalQuery.Select` function, leading to 100% CPU utilization and a Denial of Service (DoS) condition for the affected system.
Title Github.com/antchfx/xpath: xpath: denial of service via crafted boolean xpath expressions
First Time appeared Redhat
Redhat acm
Redhat enterprise Linux
Redhat migration Toolkit Applications
Redhat openshift
Redhat openshift Compliance Operator
Redhat openshift Distributed Tracing
Redhat openshift File Integrity Operator
Weaknesses CWE-835
CPEs cpe:/a:redhat:acm:2
cpe:/a:redhat:migration_toolkit_applications:8
cpe:/a:redhat:openshift:4
cpe:/a:redhat:openshift_compliance_operator:1
cpe:/a:redhat:openshift_distributed_tracing:3
cpe:/a:redhat:openshift_file_integrity_operator:1
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat acm
Redhat enterprise Linux
Redhat migration Toolkit Applications
Redhat openshift
Redhat openshift Compliance Operator
Redhat openshift Distributed Tracing
Redhat openshift File Integrity Operator
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-03-23T15:00:36.532Z

Reserved: 2026-03-23T12:21:39.096Z

Link: CVE-2026-4645

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-23T14:16:36.063

Modified: 2026-03-23T14:31:37.267

Link: CVE-2026-4645

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses